• Title/Summary/Keyword: Effectiveness secure

Search Result 287, Processing Time 0.024 seconds

Efficient Proxy Re-encryption Scheme for E-Voting System

  • Li, Wenchao;Xiong, Hu
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.15 no.5
    • /
    • pp.1847-1870
    • /
    • 2021
  • With the development of information and communication technologies, especially wireless networks and cell phones, the e-voting system becomes popular as its cost-effectiveness, swiftness, scalability, and ecological sustainability. However, the current e-voting schemes are faced with the problem of privacy leakage and further cause worse vote-buying and voter-coercion problems. Moreover, in large-scale voting, some previous e-voting system encryption scheme with pairing operation also brings huge overhead pressure to the voting system. Thus, it is a vital problem to design a protocol that can protect voter privacy and simultaneously has high efficiency to guarantee the effective implementation of e-voting. To address these problems, our paper proposes an efficient unidirectional proxy re-encryption scheme that provides the re-encryption of vote content and the verification of users' identity. This function can be exactly applied in the e-voting system to protect the content of vote and preserve the privacy of the voter. Our proposal is proven to be CCA secure and collusion resistant. The detailed analysis also shows that our scheme achieves higher efficiency in computation cost and ciphertext size than the schemes in related fields.

Countermeasure against MITM attack Integrity Violation in a BLE Network (BLE 네트워크에서 무결성 침해 중간자 공격에 대한 대응기법)

  • Han, Hyegyeon;Lee, Byung Mun
    • Journal of Korea Multimedia Society
    • /
    • v.25 no.2
    • /
    • pp.221-236
    • /
    • 2022
  • BLE protocol prevents MITM attacks with user interaction through some input/output devices such as keyboard or display. Therefore, If it use a device which has no input/output facility, it can be vulnerable to MITM attack. If messages to be sent to a control device is forged by MITM attack, the device can be abnormally operated by malicious attack from attacker. Therefore, we describes a scenario which has the vulnerabilities of the BLE network in this paper and propose countermeasure method against MITM attacks integrity violations. Its mechanism provides data confidentiality and integrity with MD5 and security key distribution of Diffie Helman's method. In order to verify the effectiveness of the countermeasure method proposed in this paper, we have conducted the experiments. ​As experiments, the message was sent 200 times and all of them successfully detected whether there was MITM attack or not. In addition, it took at most about 4.2ms delay time with proposed countermeasure method between devices even attacking was going on. It is expected that more secure data transmission can be achieved between IoT devices on a BLE network through the method proposed.

Development of a Non-contact Input System Based on User's Gaze-Tracking and Analysis of Input Factors

  • Jiyoung LIM;Seonjae LEE;Junbeom KIM;Yunseo KIM;Hae-Duck Joshua JEONG
    • Korean Journal of Artificial Intelligence
    • /
    • v.11 no.1
    • /
    • pp.9-15
    • /
    • 2023
  • As mobile devices such as smartphones, tablets, and kiosks become increasingly prevalent, there is growing interest in developing alternative input systems in addition to traditional tools such as keyboards and mouses. Many people use their own bodies as a pointer to enter simple information on a mobile device. However, methods using the body have limitations due to psychological factors that make the contact method unstable, especially during a pandemic, and the risk of shoulder surfing attacks. To overcome these limitations, we propose a simple information input system that utilizes gaze-tracking technology to input passwords and control web surfing using only non-contact gaze. Our proposed system is designed to recognize information input when the user stares at a specific location on the screen in real-time, using intelligent gaze-tracking technology. We present an analysis of the relationship between the gaze input box, gaze time, and average input time, and report experimental results on the effects of varying the size of the gaze input box and gaze time required to achieve 100% accuracy in inputting information. Through this paper, we demonstrate the effectiveness of our system in mitigating the challenges of contact-based input methods, and providing a non-contact alternative that is both secure and convenient.

Effects on Unplanned Extubation, Oral Mucosa, and Facial Skin Integrity of New Method to Secure Endotracheal Tube (새로운 기관튜브 고정기구 적용이 비계획적 발관과 구강·안면 피부 통합성에 미치는 효과)

  • Kim, Jung Sook;Lee, Eun Sook;Park, Jin Hyang
    • Journal of Korean Clinical Nursing Research
    • /
    • v.15 no.3
    • /
    • pp.49-59
    • /
    • 2009
  • Purpose: Examination was done of the effects on unplanned extubation, oral mucosa, and facial skin integrity in patients with oral intubation secured with a new method using Multifix Endo II. Methods: A prospective quasai-experimental design was used. Data were collected during a 3-week EICU admission period between Jun. 1 and Nov. 30. Two hundreds seventeen (conventional taping group: 105, Multifix Endo II group: 112) orally intubated adults were enrolled in the study at the EICU of the C University Hospital. Results: The incidence of unplanned extubation (${\chi}^2=11.580$, p=0.03) and scores for the facial skin integrity impairment of the Mutifix Endo II group (t=5.28, p=.000) were significantly lower than those of the conventional taping group even though the scores for oral mucosa impairment were not different. The nurse's evaluation of the clinical effectiveness of the two methods including convenience, comfort, safety, and satisfaction were also higher for the new securement method compared to the conventional taping group. Conclusion: The securement method using Mutifix Endo II was more effective than the conventional method in the prevention of unplanned extubation and maintenance facial skin integrity.

Contemporary Safety Management of Virtual Golf in South Korea

  • MOON, Bo Ra;LEE, Seung Min;SEO, Won Jae
    • Journal of Sport and Applied Science
    • /
    • v.6 no.1
    • /
    • pp.1-4
    • /
    • 2022
  • Purpose: The purpose of this study is to provide implications for virtual golf safety management in Korea through the literature review of current safety issues of virtual golf industry. Research design, data, and methodology: This study employed a qualitative approach to review prior studies and related documents presenting current safety perspectives of virtual sports facility management. First, the study reviewed the experiences of virtual golf players and safety criteria suggested from previous literatures. Second, two experts in sport facility management reviewed the manuscript including implications and provided their opinions including major implications and insights for virtual sport industry. Views of experts were added to the final manuscript. Results: This study found that installation standards and safety and hygiene standards by industry are enacted for the safety management of sports facilities, however, there is a need for standards to be adjusted because the contents are general, abstract, and lack detail, thus causing difficultly to secure effectiveness. Conclusions: For virtual golf courses, it is necessary to develop a safety inspection checklist that suits the characteristics of indoor virtual golf. In this line, safety criteria need to be developed with the consideration of characteristics of screen golf to establish an efficient safety management system and create a safe use environment.

A Study on the Development of a MOOC Design Model

  • LEE, Gayoung;KEUM, Sunyoung;KIM, Myungsun;CHOI, Yoomi;RHA, Ilju
    • Educational Technology International
    • /
    • v.17 no.1
    • /
    • pp.1-37
    • /
    • 2016
  • The purpose of this study was to develop a MOOC design model that would improve the current practice of MOOC development in Korea by specifying easy-to-use course development procedures and guiding strategies. Following Richey and Klein (2007)'s conceptual model development procedure, the first step was to perform critical review of relevant literature and observe typical MOOC development processes. As a result, the initial model was developed. The second step was to conduct the expert review with five educational technology and MOOC researchers to secure the internal validity of the model. Based on the experts' suggestions, the model was revised and once again reviewed by the same experts. This process resulted in the development of the 2nd version of model. The third step was to carry out external validation research in order to test the effectiveness, efficiency, and usability of the model. A basic model may be confirmed or corrected based on examination of its results. Consequently, the model was elaborated as the final model. In the final model, 6 procedural phases and 9 specific steps were included. The six procedural phases are: Analysis (1st Iteration), Design, Development (Course Development), Implementation, Evaluation, and Analysis (2nd Iteration), a slight variation of ADDIE model. The specific steps include: 1) Goal Setting, 2) Environment Analysis, 3) Content Design, 4) Style Design, 5) Course Development, 6) Implementation Plan, 7) Course Implementation, 8) Summative Evaluation, and 9) Need Reflection. The study concluded with suggestions for further research and application of the MOOC design model.

A Study on Localization Technique Using Extended Kalman Filter for Model-Scale Autonomous Marine Mobility (모형 스케일 자율운항 해양 이동체의 확장칼만필터 기반 측위 기법에 관한 연구)

  • Youngjun You
    • Journal of the Society of Naval Architects of Korea
    • /
    • v.61 no.2
    • /
    • pp.98-105
    • /
    • 2024
  • Due to the low accuracy of measured data obtained from low-cost GNSS and IMU devices, it was hard to secure the required accuracy of the measured position and heading angle for autonomous navigation which was conducted by a model-scale marine mobility. In this paper, a localization technique using the Extended Kalman Filter (EKF) is proposed for coping with the issue. First of all, a position and heading angle estimator is developed using EKF with the assumption of a point mass model. Second, the measured data from GNSS and IMU, including position, heading angle, and velocity are used for the estimator. In addition, the heading angle is additionally obtained by comparing the LiDAR point cloud with map information for a temporal water tank. The newly acquired heading angle is integrated into the estimator as an additional measurement to correct the inaccuracy in the heading angle measured from the IMU. The effectiveness of the proposed approach is investigated using data acquired from preliminary tests of the model-scale autonomous marine mobility.

Enhancing VANET Security: Efficient Communication and Wormhole Attack Detection using VDTN Protocol and TD3 Algorithm

  • Vamshi Krishna. K;Ganesh Reddy K
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.18 no.1
    • /
    • pp.233-262
    • /
    • 2024
  • Due to the rapid evolution of vehicular ad hoc networks (VANETs), effective communication and security are now essential components in providing secure and reliable vehicle-to-vehicle (V2V) and vehicle-to-infrastructure (V2I) communication. However, due to their dynamic nature and potential threats, VANETs need to have strong security mechanisms. This paper presents a novel approach to improve VANET security by combining the Vehicular Delay-Tolerant Network (VDTN) protocol with the Deep Reinforcement Learning (DRL) technique known as the Twin Delayed Deep Deterministic Policy Gradient (TD3) algorithm. A store-carry-forward method is used by the VDTN protocol to resolve the problems caused by inconsistent connectivity and disturbances in VANETs. The TD3 algorithm is employed for capturing and detecting Worm Hole Attack (WHA) behaviors in VANETs, thereby enhancing security measures. By combining these components, it is possible to create trustworthy and effective communication channels as well as successfully detect and stop rushing attacks inside the VANET. Extensive evaluations and simulations demonstrate the effectiveness of the proposed approach, enhancing both security and communication efficiency.

Biometric verified authentication of Automatic Teller Machine (ATM)

  • Jayasri Kotti
    • Advances in environmental research
    • /
    • v.12 no.2
    • /
    • pp.113-122
    • /
    • 2023
  • Biometric authentication has become an essential part of modern-day security systems, especially in financial institutions like banks. A face recognition-based ATM is a biometric authentication system, that uses facial recognition technology to verify the identity of bank account holders during ATM transactions. This technology offers a secure and convenient alternative to traditional ATM transactions that rely on PIN numbers for verification. The proposed system captures users' pictures and compares it with the stored image in the bank's database to authenticate the transaction. The technology also offers additional benefits such as reducing the risk of fraud and theft, as well as speeding up the transaction process. However, privacy and data security concerns remain, and it is important for the banking sector to instrument solid security actions to protect customers' personal information. The proposed system consists of two stages: the first stage captures the user's facial image using a camera and performs pre-processing, including face detection and alignment. In the second stage, machine learning algorithms compare the pre-processed image with the stored image in the database. The results demonstrate the feasibility and effectiveness of using face recognition for ATM authentication, which can enhance the security of ATMs and reduce the risk of fraud.

Evaluation of Structural Safety for Hydrogen Tube Trailer Considering Dynamic Property (동적 특성을 고려한 수소 튜브 트레일러의 구조 안전성 평가)

  • Y. B. Kim;M. G. Kim;D. C. Ko
    • Transactions of Materials Processing
    • /
    • v.33 no.3
    • /
    • pp.169-177
    • /
    • 2024
  • Recently, hydrogen energy has been widely used because of strict regulations on greenhouse gas emissions. For using the hydrogen energy, it is required to supply hydrogen through a tube trailer. However hydrogen tube trailer can have excessive load problems during transportation due to reasons such as road shape and driving method, which may lead a risk of hydrogen leakage. So it is necessary to secure a high level of safety. The purpose of this study is to evaluate structural safety for the conservative design of hydrogen tube trailer. First, finite element(FE) modeling of the designed hydrogen tube trailer was performed. After that, safety evaluation method was established through static structural simulation based on the standard GC207 conditions. In addition, effectiveness of the designed model was confirmed through the results of the structural safety evaluation. Finally, driving simulation was used to derive acceleration graph according to time, which was considered as a dynamic property for the evaluation of conservative tube trailer safety evaluation. And dynamic structural simulation was conducted as a condition for actual transportation of tube trailer by applying dynamic properties. As a results, conservative safety was evaluated through dynamic structural simulation and the safety of hydrogen tube trailer was confirmed through satisfaction of the safety rate.