• Title/Summary/Keyword: 정보취약

Search Result 4,361, Processing Time 0.036 seconds

Device Authentication Protocol for LR-WPAN using Pre-Authentication Mechanism (LR-WPAN에서 사전인증기법을 이용한 기기 인증 프로토콜)

  • Lee, Sung-Hyung;Kim, Jae-Hyun
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.47 no.4
    • /
    • pp.63-72
    • /
    • 2010
  • This paper proposes a new authentication protocol for the LR-WPAN. In order to guarantee the reliability and safety of a protocol, this protocol uses the hierarchical authentication approach. In addition, in order to reduce the impact of the denial of service attack, the proposed protocol performs the authentication between a parent router and a joiner device prior to the authentication between a trust center and the joiner device. Moreover, this protocol reduces the authentication delay by decreasing the number of message exchanges during authentication procedure. This paper evaluates the safety of the proposed protocol by the security analysis and reliability of the proposed protocol by the GNY analysis. This paper also compares the number of message exchanges of the ZigBee authentication protocol and the proposed protocol when denial of service attack occurs to evaluate the resistance of the proposed protocol against the denial of service attack. We also analyze the delay for authentication of the joiner device through the implementation of both protocols. Those results show that the proposed protocol effectively protects networks from the denial of service attack and reduces the time for authenticating the joiner device up to maximum 30% as the number of hops increases.

A Study on Analysis of Landslide Disaster Area using Cellular Automata: An Application to Umyeonsan, Seocho-Gu, Seoul, Korea (셀룰러 오토마타를 이용한 산사태 재난지역 분석에 관한 연구 - 서울특별시 서초구 우면산을 대상으로-)

  • Yoon, Dong-Hyeon;Koh, Jun-Hwan
    • Spatial Information Research
    • /
    • v.20 no.1
    • /
    • pp.9-18
    • /
    • 2012
  • South Korea has many landslides caused by heavy rains during summer time recently and the landslides continue to cause damages in many places. These landslides occur repeatedly each year, and the frequency of landslides is expected to increase in the coming future due to dramatic global climate change. In Korea, 81.5% of the population is living in urban areas and about 1,055 million people are living in Seoul. In 2011, the landslide that occurred in Seocho-dong killed 18 people and about 9% of Seoul's area is under the same land conditions as Seocho-dong. Even the size of landslide occurred in a city is small, but it is more likely to cause a big disaster because of a greater population density in the city. So far, the effort has been made to identify landslide vulnerability and causes, but now, the new dem and arises for the prediction study about the areal extent of disaster area in case of landslides. In this study, the diffusion model of the landslide disaster area was established based on Cellular Automata(CA) to analyze the physical diffusion forms of landslide. This study compared the accuracy with the Seocho-dong landslide case, which occurred in July 2011, applying the SCIDDICA model and the CAESAR model. The SCIDDICA model involves the following variables, such as the movement rules and the topographical obstacles, and the CAESAR model is also applied to this process to simulate the changes of deposition and erosion.

Territory Size of Breeding Chinese Sparrowhawks($Accipiter$ $soloensis$) in Korea (붉은배새매($Accipiter$ $soloensis$)의 번식기 세력권 추정)

  • Choi, Chang-Yong;Nam, Hyun-Young;Lee, Woo-Shin
    • Korean Journal of Environment and Ecology
    • /
    • v.26 no.2
    • /
    • pp.186-191
    • /
    • 2012
  • The Chinese Sparrowhawk($Accipiter$ $soloensis$) is the most common breeding raptor in Korea, but its spatial use in the breeding season has been poorly documented. Therefore, to estimate the territory and home range sizes of breeding sparrowhawks, six territorial males(four in 2005 and two in 2006) were observed from June to July in Gyeonggi Province, the Republic of Korea. Main perches, which were used repeatedly(more than three times) or where apparent territorial behaviors were observed, were identified and the locations were analyzed by GIS software. According to the 100% Minimum Convex Polygons which were identified from $25.2{\pm}5.3$ perches, Chinese Sparrowhawks occupied $4.62{\pm}0.90$ ha for breeding territories and used $22.57{\pm}5.12$ ha for their home ranges. These estimates showed larger spatially occupied areas than those in one previous report, but this study suggests that Chinese Sparrowhawks intensively use small areas throughout the breeding season. This result also implies that the sparrowhawks have the potential to be significantly affected by any habitat changes and resource exploitation in the small areas(particularly in small rice paddies of 0.6-2.0 ha) which they largely rely on for food. Although this study was based on observations solely for territory size estimations, this study may be worthwhile as preliminary pilot research for Chinese Sparrowhawk conservation, management, and further studies.

A Study on the Collection and Utilization of Myanmar Plants as Garden Plants (정원소재로서의 미얀마 유용 및 관상식물 수집·활용에 관한 연구)

  • Ahn, Tai Hyeon;Goh, Yeo Bin;Jin, Hye Young;Bae, Jun Gyu;Lee, Ki Cheol
    • Korean Journal of Plant Resources
    • /
    • v.33 no.4
    • /
    • pp.404-416
    • /
    • 2020
  • Studies on the preservation and propagation of tropical and subtropical plants are required, but the studies are insufficient in Korea. Since 2013, the Tropical Plant Resources Research Center has been collaborating on field research and publication to preserve plant diversity in Myanmar protected areas and Sagging areas in cooperation with Ministry of Natural Resources and Environment Conservation and the Myanmar Forest Research Institute. This study is to provide information on cooperative projects. As a result of the joint research between the Korea National Arboretum and Myanmar, in December 2018, the Korea National Arboretum Tropical Plant Resources Research Center is on display for conservation and education purposes with the 65 Myanmar useful materials and specimens of 326 kinds of plants and specimens that Myanmar Forest Research Institute donated. This donation is the first case of Myanmar's export of plant organisms to a foreign country, and as for the Korea National Arboretum, it is the second official case of introducing a mass plant from foreign governments. The study will also accelerate preservation biodiversity and propagation methods of tropical and subtropical plants as well as research on biodiversity conservation and industrial use.

Determination Method of Security Threshold using Fuzzy Logic for Statistical Filtering based Sensor Networks (통계적 여과 기법기반의 센서 네트워크를 위한 퍼지로직을 사용한 보안 경계 값 결정 기법)

  • Kim, Sang-Ryul;Cho, Tae-Ho
    • Journal of the Korea Society for Simulation
    • /
    • v.16 no.2
    • /
    • pp.27-35
    • /
    • 2007
  • When sensor networks are deployed in open environments, all the sensor nodes are vulnerable to physical threat. An attacker can physically capture a sensor node and obtain the security information including the keys used for data authentication. An attacker can easily inject false reports into the sensor network through the compromised node. False report can lead to not only false alarms but also the depletion of limited energy resource in battery powered sensor networks. To overcome this threat, Fan Ye et al. proposed that statistical on-route filtering scheme(SEF) can do verify the false report during the forwarding process. In this scheme, the choice of a security threshold value is important since it trades off detection power and energy, where security threshold value is the number of message authentication code for verification of false report. In this paper, we propose a fuzzy rule-based system for security threshold determination that can conserve energy, while it provides sufficient detection power in the SEF based sensor networks. The fuzzy logic determines a security threshold by considering the probability of a node having non-compromised keys, the number of compromised partitions, and the remaining energy of nodes. The fuzzy based threshold value can conserve energy, while it provides sufficient detection power.

  • PDF

Patent Analysis of Oil Sands Bitumen Upgrading Technologies (오일샌드 역청 개질 기술의 특허정보 분석)

  • Lee, Ki Bong;Jeon, Sang Goo;Nho, Nam Sun;Kim, Kwang Ho;Shin, Dae Hyun;Kim, Seon Wook;Kim, Yong Heon
    • Applied Chemistry for Engineering
    • /
    • v.19 no.6
    • /
    • pp.592-599
    • /
    • 2008
  • Oil sands had not received enough attention due to high production cost. However, as oil price significantly increases, oil sands are receiving more and more interest as unconventional crude oil. The value and applicability of oil sands can be enhanced by upgrading oil sands bitumen to produce synthetic crude oil (SCO). This study analyzed 213 oil sands upgrading patents applied between 1969 and 2006 in US, Canada, Japan, Europe, and Korea. The upgrading technologies could be classified into 9 detailed technologies; hydrocracking, coking, thermal cracking, deasphalting, supercritical technology, bio-technology, hydrotreating, gasification, and others. The number of patents applied for oil sands upgrading increased after 1970, reached a maximum in the early 1980, and slowly increases again in recent years. Korea has a lack of technologies for oil sands. Therefore, the technologies for oil sands production and application, specially, upgrading technologies based on accumulated oil refinery technologies need to be developed to increase self-development ratio of energy resource.

Proposal on for Response System to primary leaders' Terrorism (국가요인 테러리즘의 대응체제 구축방안)

  • Suh, Sang-Yul
    • Korean Security Journal
    • /
    • no.11
    • /
    • pp.61-86
    • /
    • 2006
  • Various terrorism in modern society against nation's dignitaries are constantly existing. They damage severely to the society and the nation's security, and they cause disorganizations of social and national rule orders. In order to provide the key figures' perfect protection, the threatening terroizing environment for primary leaders and the route of terrorism should be intercepted. Effective methods of these are summarized as follow. First, recent terrorism against the primary leaders are mostly assassinations, bomb attacks, and suicide bomb attacks, which terminate in a moment. Therefore, security service agents should keep in mind that protection is the best, and government's anti-terrorism agencies should develop policies and set the directions within a new paradigm to the advance anti-terrorism. Second, advance prevention activities against nation's VIP terrorism should be strengthened, such as strengthening security informational activities, constructing cooperative systems of domestic and international facilities, considering continuous system to prevent terrorism, and intensifying safety counterplans of human and material weak points. Third, international cooperative system should be set to apply economical and political sanctions to nations which support terror organizations in direct or indirect ways, and this system needs to strengthen the punishment against terrorists. Fourth, security systems to protect nation's primary leaders should complement, and developing programs for coping with the terrorism and establishing laws for anti-terrorism should be made. Also, educational training of agents who perform anti-terrorism duties should be strengthened, and scientific techniques and equipment for security should be made to protect primary leaders from terrorism.

  • PDF

The Model of Network Packet Analysis based on Big Data (빅 데이터 기반의 네트워크 패킷 분석 모델)

  • Choi, Bomin;Kong, Jong-Hwan;Han, Myung-Mook
    • Journal of the Korean Institute of Intelligent Systems
    • /
    • v.23 no.5
    • /
    • pp.392-399
    • /
    • 2013
  • Due to the development of IT technology and the information age, a dependency of the network over the most of our lives have grown to a greater extent. Although it provides us to get various useful information and service, it also has negative effectiveness that can provide network intruder with vulnerable roots. In other words, we need to urgently cope with theses serious security problem causing service disableness or system connected to network obstacle with exploiting various packet information. Many experts in a field of security are making an effort to develop the various security solutions to respond against these threats, but existing solutions have a lot of problems such as lack of storage capacity and performance degradation along with the massive increase of packet data volume. Therefore we propose the packet analysis model to apply issuing Big Data technology in the field of security. That is, we used NoSQL which is technology of massive data storage to collect the packet data growing massive and implemented the packet analysis model based on K-means clustering using MapReudce which is distributed programming framework, and then we have shown its high performance by experimenting.

Effects of Urban Environments on Pedestrian Behaviors: a Case of the Seoul Central Area (보행에 대한 도시환경의 차이: 서울 도심을 중심으로)

  • Kwon, Daeyoung;Suh, Tongjoo;Kim, Soyoon;Kim, Brian Hong Sok
    • Journal of Korean Society of Transportation
    • /
    • v.32 no.6
    • /
    • pp.638-650
    • /
    • 2014
  • The objective of this study is to identify the causes of pedestrian volume path to the destination by investigating the influential levels of regional and planning features in the central area of Seoul. Regional characteristics can be classified from the result of the analysis and through the spatial characteristics of pedestrian volume. For global scale analysis, Ordinary Least Squares (OLS) regression is used for the degree of influence of each characteristics to pedestrian volume. For the local scale, Geographically Weighted Regression (GWR) is used to identify regional influential factors with consideration for spatial differences. The results of OLS indicate that boroughs with transportation facilities, commercial business districts, universities, and planning features with education research facilities and planning facilities have a positive effect on pedestrian volume path to the destination. Correspondingly, transportation hubs and congested areas, commercial and business centers, and university towns and research facilities in the Seoul central area can be identified through the results of GWR. The results of this study can provide information with relevance to existing plans and policies about the importance of regional characteristics and spatial heterogeneity effects on pedestrian volume, as well as significance in the establishment of regional development plans.

Temperature Prediction Method for Superheater and Reheater Tubes of Fossil Power Plant Boiler During Operation (화력발전 보일러 과열기 및 재열기 운전 중 튜브 온도예측기법)

  • Kim, Bum-Shin;Song, Gee-Wook;Yoo, Seong-Yeon
    • Transactions of the Korean Society of Mechanical Engineers A
    • /
    • v.36 no.5
    • /
    • pp.563-569
    • /
    • 2012
  • The superheater and reheater tubes of a heavy-load fossil power plant boiler can be damaged by overheating, and therefore, the degree of overheating is assessed by measuring the oxide scale thickness inside the tube during outages. The tube temperature prediction from the oxide scale thickness measurement is necessarily accompanied by destructive tube sampling, and the result of tube temperature prediction cannot be expected to be accurate unless the selection of the overheated point is precise and the initial-operation tube temperature has been obtained. In contrast, if the tube temperature is to be predicted analytically, considerable effort (to carry out the analysis of combustion, radiation, convection heat transfer, and turbulence fluid dynamics of the gas outside the tube) is required. In addition, in the case of analytical tube temperature prediction, load changes, variations in the fuel composition, and operation mode changes are hardly considered, thus impeding the continuous monitoring of the tube temperature. This paper proposes a method for the short-term prediction of tube temperature; the method involves the use of boiler operation information and flow-network-analysis-based tube heat flux. This method can help in high-temperaturedamage monitoring when it is integrated with a practical tube-damage-assessment method such as the Larson-Miller Parameter.