• 제목/요약/키워드: Effectiveness secure

검색결과 287건 처리시간 0.031초

Securing Mobile Ad Hoc Networks Using Enhanced Identity-Based Cryptography

  • Mehr, Kamal Adli;Niya, Javad Musevi
    • ETRI Journal
    • /
    • 제37권3호
    • /
    • pp.512-522
    • /
    • 2015
  • Recent developments in identity-based cryptography (IBC) have provided new solutions to problems related to the security of mobile ad hoc networks (MANETs). Although many proposals to solve problems related to the security of MANETs are suggested by the research community, there is no one solution that fits all. The interdependency cycle between secure routing and security services makes the use of IBC in MANETs very challenging. In this paper, two novel methods are proposed to eliminate the need for this cycle. One of these methods utilizes a key pool to secure routes for the distribution of cryptographic materials, while the other adopts a pairing-based key agreement method. Furthermore, our proposed methods utilize threshold cryptography for shared secret and private key generation to eliminate the "single point of failure" and distribute cryptographic services among network nodes. These characteristics guarantee high levels of availability and scalability for the proposed methods. To illustrate the effectiveness and capabilities of the proposed methods, they are simulated and compared against the performance of existing methods.

Secure Key Distribution Protocol for ZigBee Wireless Sensor Network (ZigBee 무선 센서 네트워크에서의 안전한 키 분배 프로토콜)

  • Oh, Su-Min;Choi, Soo-Kyeong;Kwon, Ye-Jin;Park, Chang-Seop
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • 제22권4호
    • /
    • pp.745-759
    • /
    • 2012
  • It is shown in this paper that Yuksel-Nielson's key distribution scheme is not secure against key de-synchronization attack even though their scheme supplement ZigBee-2007 specification's security problems. Furthermore, a new key distribution scheme is proposed, which is the one to fix the security weakness of Yuksel-Nielson's scheme, as well as its security and performance analysis to verify its effectiveness.

Analysis of Economic Effectiveness in the Results of Construction R&D (건설R&D성과의 경제적 파급효과 분석)

  • Park, Hwan-Pyo
    • Journal of the Korea Institute of Building Construction
    • /
    • 제10권3호
    • /
    • pp.71-81
    • /
    • 2010
  • In 1994, Korean construction research and development (R&D) projects received investments amounting to 1.2 billion KRW, an amount that rose to 164.8 billion KRW in 2007. Under the current system, construction researchers submit the application records of Construction Research and Development (R&D) in construction projects to the Korea Institute of Construction & Transportation Technology Evaluation and Planning. The performance of Construction R&D projects has thus been dependent on the subjective reporting of the results by the researchers themselves. For this reason, it is difficult to secure confidence in the records of Construction Research and Development. Therefore, this research suggested measures for revitalizing Construction Research and Development, analyzed approaches to cost-saving in Construction Research and Development, and analyzed economic effectiveness in the results of construction R&D.

On the Performance Management System to Analyse the Effectiveness of Type Approval System for Railway Vehicle

  • Lee, Young Hoon;Lee, Jee Ha;Park, Chan Kyung;Kim, Young Min
    • International Journal of Internet, Broadcasting and Communication
    • /
    • 제13권1호
    • /
    • pp.1-10
    • /
    • 2021
  • The type approval system for railway vehicle has been in effect since 2016 in order to establish a regular safety management system to secure railway safety and enhance the technological competitiveness of the railway industry, abolished the conventional performance test system through the reform of the Railroad Safety Act in 2012. Until now, there has been appreciated it has been making significant contributions to railway safety and industry of operation and manufacturing companies, taking their place in accordance with the implementation of the system. But there has been no case of quantitative analysis on the effectiveness of the actual system. In this study, in order to examine the full-scale performance of the approval system and quantitatively analyze effectiveness, we identified and defined the relationships with the major elements of the type approval system based on system thinking principle and determined the calculated outcomes to relevant stakeholders. A method of establishing a type approval performance management system that can be grasped, utilized, and adjusted from a point of various stakeholders' views was proposed. This is expected to be more helpful in the implementation of the system, such as improving and applying quantitative effects to analysis by closely reviewing the effects and influencing factors of the type approval system based on the data accumulated through continuous performance management and reflecting to system improvement.

A Study on Secure and Efficient Heterogenous Network Management Scheme based on Static TTP (정적인 TTP 기반의 안전하고 효율적인 이기종 네트워크 관리 기법에 관한 연구)

  • Seo, Dae-Hee;Baek, Jang-Mi;Cho, Dong-Sub
    • Journal of Internet Computing and Services
    • /
    • 제9권6호
    • /
    • pp.63-72
    • /
    • 2008
  • Recent heterogeneous network management researches on information security, however, deal only with simple management using PKI and could not sufficiently address the different kinds of security problems that could arise in a heterogeneous network. Thus, various security requirements should first be satisfied and a security management protocol should first be developed to achieve a secure heterogeneous network. Hence, in this paper, various secure and effective heterogeneous network management that address security issues, which were merely a consideration in existing studies, are proposed. The proposed scheme for the protection of the user privacy is the central object and static middle objects of the process used to mutual authentication, also if communication between users is required 1-out-2 oblivious transfer to communicate by using secret communication, as well as the effectiveness and security conscious approach. Specially The proposed scheme is designed to enhance security and efficiency related to various services required in heterogeneous network, based on the reliable peripheral devices for TTP. Using Mobile device, which has been applied to electronic commerce transactions in existing schemes, this study also proposed an appropriate management scheme that is suitable for a dynamic environment and setting a temporary group to provide various services.

  • PDF

A Security Metrics Taxonomization Model for Software-Intensive Systems

  • Savola, Reijo M.
    • Journal of Information Processing Systems
    • /
    • 제5권4호
    • /
    • pp.197-206
    • /
    • 2009
  • We introduce a novel high-level security metrics objective taxonomization model for software- intensive systems. The model systematizes and organizes security metrics development activities. It focuses on the security level and security performance of technical systems while taking into account the alignment of metrics objectives with different business and other management goals. The model emphasizes the roles of security-enforcing mechanisms, the overall security quality of the system under investigation, and secure system lifecycle, project and business management. Security correctness, effectiveness and efficiency are seen as the fundamental measurement objectives, determining the directions for more detailed security metrics development. Integration of the proposed model with riskdriven security metrics development approaches is also discussed.

A Study on the Penalty Tax under the Korean Customs Act-Focusing on the Unconstitutionality of the Adminstrative Penalty Imposed together and Heavy Penalty Tax (한국 관세법상 가산세에 관한 연구 - 행정형벌 병과와 중가산세 조항의 위헌 여부 등을 중심으로)

  • Min-Gyu Park
    • Korea Trade Review
    • /
    • 제46권3호
    • /
    • pp.185-201
    • /
    • 2021
  • This paper analyzes the penalty tax system under the Customs Act of Korea and examines whether the penalty tax provision violate the constitutional principle of proportionality when imposed on a person who does not made import declaration intentionally or travelers who has not been made an import declaration of their carry-on items. It examines the provisions that adopt a penalty tax as a means to secure the effectiveness of the customs law. In relation to penalty tax, the case studies of the Supreme Court and Constitutional Court of Korea are analyzed by major issues such as the legal nature of the penalty tax, whether the penalty tax is unconstitutional, and the reasons for exemption from the penalty tax. There is no reasonable basis for the high penalty tax imposed on travelers' carry-on items for which import declaration has not been made. It is necessary to unify the penalty tax imposed when an import declaration is not made and the penalty tax on traveler's carry-on items. It is necessary to establish a limit on penalty tax and to create new regulations to exempt or reduce penalty tax when punished by administrative punishment to avoid double jeopardy. It is necessary to effectively secure the effectiveness of the Customs Act by converting the penalty tax into civil penalty that does not presuppose the faithful and accurate performance of tax obligations by the taxpayer. The government revised the penalty tax system in the Customs Act in 2019, but there are still many types of penalty tax and there are elements that are unconstitutional. It seems that the Korean government should lower the burden on the people by improving the system for the penalty tax system.

An Ex Ante Evaluation Method for Assessing a Government Enforced Security Measure (정부의 정보 보안 대책 법제화의 사전 효과성 분석 방법)

  • Shim, Woohyun
    • The Journal of Society for e-Business Studies
    • /
    • 제20권4호
    • /
    • pp.241-256
    • /
    • 2015
  • In order to ensure that all firms are cyber-secure, many governments have started to enforce the implementation of various security measures on firms. Prior to the implementation, however, it is vague whether government enforced security measures will be effective for mitigating cyber-security risks. By applying a method for estimating the effectiveness of a mandatory seatbelt law in reducing fatalities from motor vehicle accidents, this study develops an ex ante evaluation method that can approximate the effectiveness of a government enforced security measure in reducing country-wide or industry-wide cyber-security risks. Using data obtained from the Korean Internet and Security Agency, this study then explores how to employ the developed method to assess the effectiveness of a specific security measure in mitigating cyber-security risks, if enforced by the government, and compares the effectiveness of various security measures. The comparison shows that compulsory security training has the highest effectiveness.

The Study of Attachment Styles and Personal Relations' Variation through the Sociodrama (사회극을 통한 애착유형 및 대인관계의 변화에 관한연구)

  • 이정숙
    • Journal of Families and Better Life
    • /
    • 제15권2호
    • /
    • pp.111-126
    • /
    • 1997
  • This study was intended to measure variations in attachment styles and personal relations through the Sociodrama, There were three purposes in this study. The first was to verify the contiuance of attachment between parents and adolescents. The second was to find the difference of personal relations and self-esteem according to the different attachment styles. finally the third was to prove the therapeutic effects of sociodrama. The results were as follows: 1. In terms of attachment style 19% of the subjects were insecurity style 9.5% avoidance style and 74.1% security style. 2. The contents of Sociodrama were the daily happenings between parents and adolescent children and among siblings and friends. Every subject said that the Sociodrama helped him to shape his internal self to understand others and to realize the importance of parental roles. 3. The avoidance group became insecure after the Sociodrama because of their distinctive traits. The secure feelings of security grou also decreased due to their developmental character-individuation. 4. The comparison of the two post-tests revealed that the attachment style of the avoidance group has parents was observed as well. 5. The Sociodrama is assumed to be effective in the changes of adolescents' abnormal and insecure attachment and personal relations into a normal and secure state., In conclusion results of the study verified this assumption of the effectiveness of the sociodrama and it's longterm effects.

  • PDF

A Study of Secure Group Key Management Based on Key-Chain for Multicast Data Transmission (멀티캐스트 전송을 위한 키 체인 기반의 안전한 그룹 키 관리방안 연구)

  • Kim, Bo-Seung;Kim, Jeong-Jai;Lee, Ki-Young;Shin, Yong-Tae
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • 제11권9호
    • /
    • pp.3495-3501
    • /
    • 2010
  • Because the application simultaneously to transmit large amounts of data (Video conferencing, Internet broadcasting, Online games etc.) to multiple users increases, the importance and utilization of group communication was greater. So the security was recognized as a important issue. To provide security in multicast environment, A study of single group management server using protocol based on Key Tree Scheme was proposed. But the paper proposes secure group key management scheme to be a relatively low-overhead. Therefore proposed paper is demonstrated to be excellent by comparing the effectiveness of existing and proposed group key management scheme.