• Title/Summary/Keyword: Cyber-space

Search Result 474, Processing Time 0.031 seconds

Centralized Group Key Management Scheme for Tactical Swarming Drone Networks (전술 군집 드론 네트워크를 위한 중앙집권식 그룹키 관리 기법)

  • Lee, Jong-Kwan;Shin, Kyuyong;Kim, Kyung-Min
    • Journal of the Korea Institute of Military Science and Technology
    • /
    • v.21 no.6
    • /
    • pp.817-825
    • /
    • 2018
  • Recently, drones have been used in various field to overcome time and space limitations. However, single drone still has a lot of restriction on transportation wight and travel time. Therefore many studies have been conducted to increase the utilization by swarm of drones. Many things should be additionally considered in order to operate swarming drones securely. Especially the group key management is a challenging research topic in tactical domain due to existence of adversary that has anti-drone skill. In this paper, we proposed an efficient group key management scheme for tactical swarming drone networks where an adversary equipped with anti-drone skills exists. The group key can be updated with a small number of message exchange compared to other convenience schemes. The numerical and simulation results demonstrate that the proposed scheme manages the group key efficiently and securely.

Augmented Reality in Children's Literature

  • Kim, Ilgu
    • English & American cultural studies
    • /
    • v.14 no.2
    • /
    • pp.77-96
    • /
    • 2014
  • As the cyberspace several decades ago created a cyber fiction fever, the augmented reality as the future of imagination can generate another kind of literary genre and new social ambiance where books tend to come to life more realistically. This newly created "smart fiction," "smart movies," and "smart environment" will be full of fun, hopes and conveniences. But addiction to smart kinds will create unwanted dangerous plethora like ghost-like avatars, wild animals and Farid due to the limitations of human control over hi-technology. If so, the adventures we plan to take will turn fantasy into horror in no time. Instead of loving new scientific things blindly, the emphasis hereafter must be put rather on the potentially negative aftermaths of the new innovative technology. Some viewers after watching the film Avatar are still suffering from the syndrome called "avatar blues," a homesick for Pandora. After their experiencing of the experimental 3D effects in books and media, audience and readers are required to actively deal with the increased lack of the darker cave which the comparatively unsatisfactory present can never fill with fixity and limit. Like the prevention against the addictive online game or the manual of 3D television or 3D printer, the extreme off-limits and safety zone for this virtually and expendably subverting technology must be seriously reviewed by community before using and adopting it. Also, these technologically expanded and augmented environments must be prudently criticized by the in-depth study of literature just as cyber space begun by Gibson's cyber fiction and its criticism.

A Study on Living Space with the Internet Information Appliances (인터넷 정보가전을 활용한 주거공간 연구)

  • 전흥수;김주연
    • Korean Institute of Interior Design Journal
    • /
    • no.28
    • /
    • pp.44-50
    • /
    • 2001
  • This study propose the new concept of residence by analyzing the change of residence through the characteristic of popularity and degree of development of technology on home network information appliance for intelligent home. Accordingly, Cyber village represented as home automation and extend to information of society. it encourage need of information and multimedia of home. It expect home information infrastructure for accepting informations, which make smart home to linked home-working home-learning home-treatment. home-shopping and home-banking. The system of intelligent home is the intelligence of human-biology in the side of environmental friendly and multi-function. it distinguish the system of security, controlling system of inside environment, supporting system of house-working, automatic controlling, house working. Future house require to meet demand of young generation, such as small residental space, the multi-functional space, the flexible space, making mood for dual income couple and of single as intelligent home. Accordingly, basic purpose which are pleasantness, the safe and the convenience the mobile multi-function as well as networking with controlling of temperature, security, health-test, home-entertainment, home-office and consider environment together.

  • PDF

A Study on the Virtual Reality-based Museums : Exhibition Characteristics and Possibilities of Utilization (가상현실 기반 박물관의 전시특성 및 활용 가능성 연구 -세컨드라이프 내 박물관을 중심으로)

  • Son, Hee-Joo;Choi, Jin-Won
    • 한국HCI학회:학술대회논문집
    • /
    • 2009.02a
    • /
    • pp.862-867
    • /
    • 2009
  • The development of internet has changed the realm of life from off-line to on-line, causing not only the overall change in society but also urgently demanding change in the basic concept of museum. Virtual Museums have appeared in line with such changes, and they utilize space regardless of real time and space unlike the traditional museums that collected and preserved works for exhibition in physical space thereby playing a role of catalyst for exhibition in virtual space and for direct exchange with the public. Through relevant literatures and case studies, the present research particularly investigated the exhibition characteristics of virtual reality-based museums out of all types of cyber museum, in an effort to make a comparison with those of offline museums, and eventually to suggest a direction of virtual reality museums that would be established in the future and to consider the possibilities of utilizing them.

  • PDF

Analysis and Improvement Strategies for Korea's Cyber Security Systems Regulations and Policies

  • Park, Dong-Kyun;Cho, Sung-Je;Soung, Jea-Hyen
    • Korean Security Journal
    • /
    • no.18
    • /
    • pp.169-190
    • /
    • 2009
  • Today, the rapid advance of scientific technologies has brought about fundamental changes to the types and levels of terrorism while the war against the world more than one thousand small and big terrorists and crime organizations has already begun. A method highly likely to be employed by terrorist groups that are using 21st Century state of the art technology is cyber terrorism. In many instances, things that you could only imagine in reality could be made possible in the cyber space. An easy example would be to randomly alter a letter in the blood type of a terrorism subject in the health care data system, which could inflict harm to subjects and impact the overturning of the opponent's system or regime. The CIH Virus Crisis which occurred on April 26, 1999 had significant implications in various aspects. A virus program made of just a few lines by Taiwanese college students without any specific objective ended up spreading widely throughout the Internet, causing damage to 30,000 PCs in Korea and over 2 billion won in monetary damages in repairs and data recovery. Despite of such risks of cyber terrorism, a great number of Korean sites are employing loose security measures. In fact, there are many cases where a company with millions of subscribers has very slackened security systems. A nationwide preparation for cyber terrorism is called for. In this context, this research will analyze the current status of Korea's cyber security systems and its laws from a policy perspective, and move on to propose improvement strategies. This research suggests the following solutions. First, the National Cyber Security Management Act should be passed to have its effectiveness as the national cyber security management regulation. With the Act's establishment, a more efficient and proactive response to cyber security management will be made possible within a nationwide cyber security framework, and define its relationship with other related laws. The newly passed National Cyber Security Management Act will eliminate inefficiencies that are caused by functional redundancies dispersed across individual sectors in current legislation. Second, to ensure efficient nationwide cyber security management, national cyber security standards and models should be proposed; while at the same time a national cyber security management organizational structure should be established to implement national cyber security policies at each government-agencies and social-components. The National Cyber Security Center must serve as the comprehensive collection, analysis and processing point for national cyber crisis related information, oversee each government agency, and build collaborative relations with the private sector. Also, national and comprehensive response system in which both the private and public sectors participate should be set up, for advance detection and prevention of cyber crisis risks and for a consolidated and timely response using national resources in times of crisis.

  • PDF

A Study Privacy and Security in Ubiquitous City Environment (Focous on Computing Values Analysis of Personal Information) (유비쿼터스 도시 환경에서 프라시버시 보호 방안에 관한 소고 - 경쟁하는 개인정보가치 분석을 중심으로 -)

  • Jung Chang-Duk;Kang Jang-Mook
    • 한국정보통신설비학회:학술대회논문집
    • /
    • 2006.08a
    • /
    • pp.249-254
    • /
    • 2006
  • As the concept of Ubiquitous City has become an important issue, we need to have a voice in the field of privacy. The Ubiquitous Computing revolution, it is achieved a physical space and an intelligent union of cyber space in the space where an off-line space was integrated with on-line. It is combined with a life space naturally, and Ubiquitous creates a new integrated space. The space is the opportunity space that is limitless as soon as it is the unknown world that mankind was not able to experience yet. According to the recent papers and studies, Privacy or Personal Information sector is mentioned as a major problem for Ubiquitous Computing Society. Therefore, this paper checks Ubiquitous City, the present privacy concept and situation of currently proceeding Ubiquitous computing environment. Also, The main purpose of this paper is to analyze the concepts privacy, personal information. Thus this paper treated the analysis of case, technological or social issue, problem and solution, competing values of privacy and so on.

  • PDF

A Knowledge Representation Scheme Formalizing Spatio-Temporal Aspects of Dynamic Situations in Virtual Environments

  • Gebre, Haymanot Alalo;Choi, Jun Seong;Park, Jong Hee
    • International Journal of Contents
    • /
    • v.11 no.1
    • /
    • pp.21-30
    • /
    • 2015
  • A simulated realistic virtual environment is inhabited by autonomous cyber-humans who play the roles of agents in events. A key element, which enables this realism, is the historical context formed by time and space. A knowledge-representation scheme, composed of both spatial and temporal aspects needed by the agent to respond to dynamically changing situations, is essential for the design of a realistic virtual agent. In this work, spatial and temporal aspects of dynamic situations in the virtual environment have been formalized as a key component of our knowledge-representation scheme. This scheme provides a mathematical framework to construct realistic virtual situations that change with time, and background knowledge for agents in the simulated environment to deduce new pieces of information and plan against changing situations.

A Study on The Development and Management of The IT Standard Contents for On-line Education Based on SCORM(Sharable Content Object Reference Model) (SCORM 기반의 온라인 교육 IT 표준 컨텐츠 개발 및 운영에 관한 연구)

  • Choi, Hae-Gill
    • Journal of the Institute of Electronics Engineers of Korea CI
    • /
    • v.45 no.3
    • /
    • pp.7-14
    • /
    • 2008
  • To nurture skilled IT professionals required in the 21st information society, we have been faced to the need of learner-centered open lifelong education through the e-learning system that crosses the boundaries of time, space and geography. The object of this research is primarily as-is analysis of the IT contents in present cyber institutions, then making out the basic research data by to-be analysis and international standardization trend through benchmarking. Eventually this research intends to produce a prototype of the contents especially for the subjects related to the IT which is based on the modeling of e-Learning standard contents development model. It is possible that the final output of this project is used for the contents producing and operating data in cyber universities and institutions. This output also enhances the international competitiveness by the standardization and presents a standardized guideline to the domestic cyber education institutions.

Open API as a solution for the unification and fragmentation in online social network (온라인 소셜 네트워크의 문제점와 공개 API 를 통한 해결 방안 연구)

  • Kim, Yong-Geun;Byun, Jae-Bum;Yoon, Joon-Sung
    • 한국HCI학회:학술대회논문집
    • /
    • 2008.02b
    • /
    • pp.656-661
    • /
    • 2008
  • There are many sociological methodology for the study on cyber community. Especially for the online social network which is constructed by the notion of the social network, the social network analysis can be a superior methodology for the understanding of the general phenomenon and the solutions for the problematic issues. As pointed by Manuel Castells, the problem of the unification and the fragmentation, which is came after the participation and the openness, is prevailed in cyber community by its characteristics. However, computational properties that exceed the limitation of the time and space can bestow other alternatives. The Open API in the social network services that is more popular in these days is the one of those alternatives. Therefore, the purpose of this study is to investigate the problematic phenomenon of online social network and to search the solutions for those problems with the acceptance of Open API technology.

  • PDF

A Study about Early Detection Techniques of Cyber Threats Based Honey-Net (허니넷 기반의 사이버위협 조기탐지기법 연구)

  • Lee, Dong-Hwi;Lee, Sang-Ho;J. Kim, Kui-Nam
    • Convergence Security Journal
    • /
    • v.5 no.4
    • /
    • pp.67-72
    • /
    • 2005
  • The exponential increase of malicious and criminal activities in cyber space is posing serious threat which could destabilize the foundation of modern information society. In particular, unexpected network paralysis or break-down created by the spread of malicious traffic could cause confusion and disorder in a nationwide scale, and unless effective countermeasures against such unexpected attacks are formulated in time, this could develop into a catastrophic condition. In order to solve a same problem, this paper researched early detection techniques for only early warning of cyber threats with separate way the detection due to and existing security equipment from the large network. It researched the cyber example alert system which applies the module of based honeynet from the actual large network and this technique against the malignant traffic how many probably it will be able to dispose effectively from large network.

  • PDF