• Title/Summary/Keyword: 통제 네트워크

Search Result 450, Processing Time 0.023 seconds

Study on the Security Threats Factors of A Bluetooth Low Energy (저전력 블루투스의 보안 위협 요인들에 관한 연구)

  • Jeon, Jeong Hoo
    • Convergence Security Journal
    • /
    • v.17 no.4
    • /
    • pp.3-9
    • /
    • 2017
  • Recently, Wireless communication has been widely used as a short distance communication medium in various industrial fields as well as communication connection between home appliances due to the appearance of the Internet of Things. And Most commonly used wireless communication media include WiFi, Bluetooth, and NFC. Among them, Bluetooth is widely used for communication between smart devices as well as computer peripheral devices. And Bluetooth in the home network fields is being used to control electronic products. However, since Bluetooth security vulnerabilities are known, more and more attacks are being exploited. As the application range of Bluetooth is expanding, it is necessary to prepare countermeasures accordingly. Therefore, this study investigates the security threat factors of through Bluetooth'attack case and attack technology. And By proposing countermeasures against this problem, we intend to utilize it as data for improving the security of wireless network service in the future.

The Mobile Digital ID Wallet based on LTE/SAE for 4G Networks (4G 네트워크를 위한 LTE/SAE 기반의 모바일 전자ID지갑)

  • Jung, Yun-Seon;Lim, Sun-Hee;Yi, Ok-Yeon;Lee, Sang-Jin
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.33 no.10C
    • /
    • pp.764-777
    • /
    • 2008
  • In 4G environments, which is the next generation technology for mobile network, it is forecasted that the wireless Internet using a mobile devices such as a mobile phone, PDA will increase because of expansion of Internet and integration of heterogeneous networks. Therefore, we need a Digital ID management technology that can prevent illegal uses and manage private information efficiently in wired and wireless environments. In this paper, we analyze various Digital ID management technologies, and then define requirements of user-centric Digital ID management technology. In addition, we newly propose the authentication mechanism for mobile applications in LTE/SAE network. Finally, we propose the mobile Digital ID Wallet mechanism suitable for 4G environments.

Hybrid Health Care System Designs in a Wireless Network Environment (무선 네트워크 환경에서 하이브리드 헬스케어 시스템 설계)

  • Roh, Chang-Bae;Seo, Laiwon
    • Journal of Digital Contents Society
    • /
    • v.16 no.3
    • /
    • pp.457-462
    • /
    • 2015
  • Hybrid video call healthcare system that we propose in thesis is a service for powerless people rather than ordinary people. This system is for communication between users and protectors(or volunteers). To reduce the underprivileged through the 'Malbeot Nanumi' is the purpose of the system. Hybrid Health Care System using a video call and temperature/humidity/pulse sensors that we propose in thesis can connect sensors with software, and save p2p connection information for 'Malbeot Nanumi' service by database. And health check data can save locally. Hybrid Health Care System in a Wireless Network Environment is a system that elderly people living alone is to be a conversation. The purpose of this thesis is to develop the software and to design a convenient UI to the user, And increasing consumption of care system by increasing the happiness index and increasing aging population.

Realtime Image Transmission System based-on the Zigbee Protocol (지그비기반의 실시간 이미지전송시스템의 설계 및 구현)

  • Park, Byoung-Seob
    • Journal of the Korea Society of Computer and Information
    • /
    • v.15 no.2
    • /
    • pp.91-98
    • /
    • 2010
  • In order to control moving facilities on a remote place effectively, it are required to acquire a environment informations such as images where the moving facilities are placed. However, since there is no tools to acquire such informations to the central control system based on the non-networked sensor environments, it is difficult to control the moving facilities remotely. Therefore, we design and implement the Zigbee based image transmission system and communication protocol to control the moving target remotely. The wireless control utilizing the Zigbee protocol is that electrically consumption is more small than the Bluetooth and reliability of data transmission is better. The implemented Zigbee based control systems and communication protocol have the normal and replay function for a realtime control of the moving target under the server PC and the mobile FDA with the WiFi protocol. The functional operability and performance are analyzed by a designed prototype under the wireless home network environment.

A Study on the Mobile Communication Network and Practical use of Smart Phone for Building of Realtime Location Based Reservation System (실시간 위치기반 예약시스템 구축을 위한 이동통신망과 스마트폰 최적 활용에 관한 연구)

  • Kang, Sin-Kwan;Lee, Jeong-Bae
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.12 no.1
    • /
    • pp.283-294
    • /
    • 2012
  • Recently increasing usage of smart phones so, the application field of convergence industry between IT technology using smart phone-based mobile communication networks and other industry branches is expanding. In addition, R&D technologies in other fields are applied to smart phone applications effectively in order to develop products and support daily life more convenient. However, it is very hard to control these products and there is no efficient solution for this problem when many people are sent to specific area for big events, such as Biennale, Film Festival, EXPO, and so on. In order to solve this problem, this paper describes a network-based ticket reservation system and its organization using augmented reality on smart phone and mobile communication networks. In particular, we propose a method of designing and developing prototyping system based on smart phone application design technologies, prior to developing real smart phone application.

A Development of the Operational Architecture of a Low Altitude Air Defense Automation System (저고도 방공자동화체계의 운용아키덱처 개발)

  • Son, Hyun-Sik;Kwon, Yong-Soo
    • Journal of the military operations research society of Korea
    • /
    • v.34 no.1
    • /
    • pp.31-45
    • /
    • 2008
  • This paper describes a development of the operational architecture of a low altitude air defense automation system using a systems engineering approach. The future battlefield is changing to new system of systems that command and control by the network based BM/C4I. Also, it is composed of various sensors and shooters in an single theater. Future threats may be characterized as unmanned mewing bodies that the strategic effect is great such as UAVs, cruise missiles or tactical ballistic missiles. New threats such as low altitude stealth cruise missiles may also appear. The implementation of a low altitude air defense against these future threats is required to complex and integrated approach based on systems engineering. In this view, this work established an operational scenario and derived operational requirements by identifying mission and future operational environments. It is presented the operational architecture of the low altitude air defense automation system by using the CORE 5.0.

A Priority-based MAC Protocol to Support QoS in Ad-hoc Networks (애드 혹 네트워크 QoS 지원을 위한 우선순위 기반 MAC 프로토콜)

  • Wang, Weidong;Seo, Chang-Keun;Yoo, Sang-Jo
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.30 no.2A
    • /
    • pp.80-89
    • /
    • 2005
  • In IEEE 802.11 and 802.11e for ad hoc networks, DCF and EDCA use a contention-based protocol called CSMA/CA, which is simple to implement efficient when the system is light loaded. But the performance of CSMA/CA decreases dramatically when the system load is heavy because of increasing collisions. In PCF and HCF modes, stations are controlled by a base station by polling, no collision ever occurs. However, when the system load is light, the performance is poor because few stations have data to transfer. More important, PCF and HCF can not be used in the ad hoc networks. In this paper, we address a priority-based distributed polling mechanism (PDPM) that implements polling scheme into DCF or EDCA modes for ad hoc networks by adding a polling approach before every contention-based procedure. PDPM takes the advantages of polling mechanism that avoids most of collisions in a high load condition. At the same time, it also keeps the contention-based mechanism for a light loaded condition. PDPM provides quality of service (QoS) with fewer collisions and higher throughput compared with IEEE 802.11e.

스마트 사회의 보안위협과 정보보호 정책추진에 관한 제언

  • Lee, Gi-Ju
    • Information and Communications Magazine
    • /
    • v.30 no.1
    • /
    • pp.24-32
    • /
    • 2012
  • 우리는 지금 스마트 사회에 살아가고 있다. 언제 어디서든 스마트 디바이스를 통해 기존에 PC에서 하던 작업들을 손쉽게 하고 있다. 한편 스마트폰의 확산으로 이용자 수가 급증하고 있는 소셜네트워크 서비스(SNS)는 이용자들이 자신의 일상적인 이야기를 사이버공간에 게시함으로 인해 개인의 사생활 정보들이 노출되고, 그러한 정보들이 범죄에 악용되는 사례들이 눈에 띄게 증가하고 있다. 또한 SNS를 이용한 악성코드의 유포 및 빠른 전파 등도 새로운 보안위협으로 나타나고 있다. 그 밖에 스마트 기기를 대상으로 한 해킹 및 악성코드 감염 등 위협이 증가하고 있는 형편이다. 본고에서는 스마트 사회의 주요 보안위협을 살펴보고 미국, 유럽, 일본, 호주 등 선진국의 관련 정책 동향과 국내 정책과 실태를 분석하여 새로운 정보보호 정책 수립 방향을 제언하고자 한다. 스마트 사회 위험 요소로 가장 보편적으로 사용되고 있는 스마트폰과 스마트폰을 통해 이용되고 있는 소셜네트워크 서비스, 클라우드 서비스의 보안위협을 제기하고 최근 글로벌 이슈로 떠오르고 있는 빅 데이터 환경의 보안위협을 분석하였다. 스마트 사회의 위협을 대비하고 있는 주요국 정책을 살펴보면, 미국의 경우 사회적 합의를 바탕으로한 감시와 통제를 강화하는 정책을 추진 중에 있으며 유럽의 5개국 EU5(영국, 독일, 프랑스, 스페인, 이탈리아)는 스마트폰 위협을 중심으로 공동 대응 방안을 마련하고 있다. 일본은 스마트 워크중심의 보안대책을 강구하고 있으며 호주는 스마트 사회 보안위협에 대한 국민의 인식제고에 주력하고 있다. 국내의 경우도 스마트 사회의 보안위협에 선제적 대응을 위하여 "스마트 모바일 시큐리티 종합계획"을 수립하여 추진중에 있다. 하지만 보안 실태를 보면 스마트 사회 보안위협에 대한 이용자들의 우려는 높은 반면 기업의 보안 대책 마련에 대한 투자는 여전히 미흡한 상황이다. 향후 우리 사회가 디바이스간 융합을 넘어 모든 사물이 연결되는 초(超)연결(Hyper-Connectivity) 시대로 진화되어 가면 편리성이 증대되는 만큼 더 많은 위협에 우리의 일상이 노출되는 문제가 발생하게 될 것이다. 안전한 미래 사회로 진입하기 위해서는 보다 체계적이고 종합적인 정보보호 정책마련이 필요하다. 본고에서는 이를 위한 정책수립의 방향을 제언했다.

CSfC Network Security Architecture Analysis for the Assurance of Commercial Security Solutions in Defense Area (국방 상용보안제품 도입을 위한 CSfC(Commercial Solutions for Classified Program) 네트워크 보안 아키텍처 분석)

  • Lee, Yong-joon;Park, Se-joon;Park, Yeon-chool
    • Journal of Internet Computing and Services
    • /
    • v.22 no.6
    • /
    • pp.91-97
    • /
    • 2021
  • The United States is responding to evolving cyberattacks through the Commercial Solutions for Classified Program (CSfC). Authorized safety evaluation and certification are being carried out so that US government agencies can quickly introduce civilian commercial security products into the national pavilion. Commercial security products registered in the CSfC process can be used by defense agencies through a rapid approval process. Defense agencies approve commercial security products without duplicate evaluation. Approved security products can reduce the time, cost, and cost of the approval process required to implement the defense information system. In this study, security control for 4 types of network security architecture MSC (Multi-Site Connectivity), MA (Mobile Access), Campus WLAN, and DAR (Data at Rest) proposed by the US National Security Agency (NSA) for introduction to national defense A detailed analysis was performed on the items.

A Study on Multiplexer Assignment Problem for Efficient Dronebot Network (효율적인 드론봇 네트워크 구성을 위한 Multiplexer 할당모형에 관한 연구)

  • Seungwon Baik
    • Journal of The Korean Institute of Defense Technology
    • /
    • v.5 no.2
    • /
    • pp.17-22
    • /
    • 2023
  • In the midst of the development of science and technology based on the 4th industrial revolution, the ROK Army is moving forward with the ARMY TIGER 4.0 system, a ground combat system that combines future advanced science and technology. The system is developing around an AI-based hyper-connected ground combat system, and has mobility, intelligence, and networking as core concepts. Especially, the dronebot combat system is used as a compound word that refers to unmanned combat systems including drones and ground unmanned systems. In future battlefields, it is expected that the use of unmanned and artificial intelligence-based weapon systems will increase. During the transition to a complete unmanned system, it is a very important issue to ensure connectivity individual unmanned systems themselves or between manned and unmanned systems on the battlefield. This paper introduces the Multiplexer Allocation Problem (MAP) for effective command control and communication of UAV/UGV, and proposes a heuristic algorithm. In addition, the performance of the proposed algorithm is analyzed by comparing the solutions and computing time. Also, we discuss future research area for the MAP.

  • PDF