• Title/Summary/Keyword: Hierarchical Security

Search Result 263, Processing Time 0.026 seconds

Clustering Algorithms for Reducing Energy Consumption - A Review

  • Kinza Mubasher;Rahat Mansha
    • International Journal of Computer Science & Network Security
    • /
    • v.23 no.7
    • /
    • pp.109-118
    • /
    • 2023
  • Energy awareness is an essential design flaw in wireless sensor network. Clustering is the most highly regarded energy-efficient technique that offers various benefits such as energy efficiency and network lifetime. Clusters create hierarchical WSNs that introduce the efficient use of limited sensor node resources and thus enhance the life of the network. The goal of this paper is to provide an analysis of the various energy efficient clustering algorithms. Analysis is based on the energy efficiency and network lifetime. This review paper provides an analysis of different energy-efficient clustering algorithms for WSNs.

The Effect of Attachment Security on Preschoolers' Perspective Taking: Executive Function as a Mediator (유아의 애착안정성이 조망수용에 미치는 영향: 실행기능의 매개효과를 중심으로)

  • Park, Ha-Yeon;Yi, Soon-Hyung
    • Korean Journal of Child Studies
    • /
    • v.37 no.6
    • /
    • pp.19-33
    • /
    • 2016
  • Objective: This study aimed to examine the prospective links among perspective taking, attachment security, and executive function and the mediating role of executive function on the relationship between attachment security and perspective taking. Methods: The participants included 147 preschoolers living in Gyeonggi. The data-analysis methods included descriptive statistics, independent t-tests, one-way ANOVAs, Pearson's correlation analysis, hierarchical multiple regression analysis, and the Sobel test. Results: First, preschoolers' perspective taking was significantly related to attachment security, and executive function. Furthermore, there was a significant association between attachment security and executive function. As expected, the correlations were positive in all cases. Second, the effects of attachment security on intention and emotion perspective takings were fully mediated by executive function when holding children's age and vocabulary constant. However, executive function did not predict thought perspective taking, whereas attachment security did. Conclusion: Given that parent-child attachment security might play an important role in child cognitive and socio-cognitive development, parents' endeavors to enhance the quality of the attachment relationship could be a fruitful path for preschoolers' developing executive capacities and perspective taking.

Development of an Intelligent Security Robot System for Home Surveillance (가정용 지능형 경비 로봇 시스템 개발)

  • Park, Jeong-Ho;Shin, Dong-Gwan;Woo, Chun-Kyu;Kim, Hyung-Chul;Kwon, Yong-Kwan;Choi, Byoung-Wook
    • Journal of Institute of Control, Robotics and Systems
    • /
    • v.13 no.8
    • /
    • pp.810-816
    • /
    • 2007
  • A security robot system named EGIS-SR is a mobile security robot through one of the new growth engine project in robotic industries. It allows home surveillance through an autonomous mobile platform using onboard cameras and wireless security sensors. EGIS-SR has many sensors to allow autonomous navigation, hierarchical control architecture to handle lots of situations in monitoring home surveillance and mighty networks to achieve unmanned security services. EGIS-SR is tightly coupled with a networked security environment, where the information of the robot is remotely connected with the remote cockpit and patrol man. It achieved an intelligent unmanned security service. The robot is a two-wheeled mobile robot and has casters and suspension to overcome a doorsill. The dynamic motion is verified through $ADAMS^{TM}$ simulation. For the main controller, PXA270 based hardware platform based on linux kernel 2.6 is developed. In the linux platform, data handling for various sensors and the localization algorithm are performed. Also, a local path planning algorithm for object avoidance with ultrasonic sensors and localization using $StarGazer^{TM}$ is developed. Finally, for the automatic charging, a docking algorithm with infrared ray system is implemented.

Relation of Empowerment and Organization Attachment with the Organization Culture of Security Organization (시큐리티조직의 조직문화와 임파워먼트 및 조직애착도의 관계)

  • Kim, Chan Sun
    • Convergence Security Journal
    • /
    • v.14 no.1
    • /
    • pp.33-41
    • /
    • 2014
  • The purpose of this study is to establish the relationship of empowerment and organization attachment with the organization culture of security organization. This study is based by setting the security organization employed in security firms in the capital area(Seoul) in 2012 as the parent population and using the purposive sampling method to analyze a total amount of 280 examples. The frequency analysis, analysis on primary factors, reliability analysis, multiple regression analysis, path analysis methods using SPSSWIN 18.0 were used in analysis. The reliability of the survey showed a Cronbach's ${\alpha}$ value of over 0.690. The results are like the following. First, the organization culture of security organization affect empowerment. Thus, the more a practical development culture is settled, the more the capability of self-determinism, meaningfulness, and effect is amplified. Moreover, the more a consensual culture is established, the more the capability of self-determinism is enhanced, and the more a hierarchical culture is established, the more the meaningfulness is enhanced. Second, the organization culture of security organization affect organization attachment. Thus, the continuous normative attachment is enhanced when a more hierarchical culture is established. Moreover, emotional attachment is enhanced when a more practical development culture is established. Third, the empowerment of security organization affects organization attachment. Thus, the continuous normative attachment is decreased when one's capability of self-determinism is more lacking. However, the continuous normative attachment is higher when the meaningfulness and effect is enhanced. Moreover, emotional attachment is enhanced when meaningfulness is increased. Fourth, the organization culture of security organization directly/indirectly affects empowerment and organization attachment. Thus, empowerment is an important mediating factor between organization culture and organization attachment.

Decision on Replacing Components of Security Functions in COTS Based Information Systems in Security Environment Utilizing ARP (AHP 기법을 이용한 보안환경을 고려한 COTS 기반 정보시스템의 보안기능 컴포넌트 대체 수준 의사결정)

  • Choi, Myeong-Gil;Hwang, Won-Joo;Kim, Myoung-Soo
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.10 no.3
    • /
    • pp.579-588
    • /
    • 2009
  • Enterprises and governments currently utilize COTS (Commercial off-the-Shelf) based information systems which are a kind of component based systems. Especially, COTS are widely utilized as components of information security systems and information systems. This paper suggests an appropriate adaptation level and a cost effective priority to replace security functional components in security environment. To make a cost effective decision on adapting security functional components, this paper develops a hierarchical model of information security technologies and analyzes findings through multiple decision-making criteria.

Design of User Authentication Mechanism based on WPKI

  • Lee Cheoi Seung;Park Do Jun;Shin Myung Souk;Lee Jeong Gi;Lee Joon
    • Proceedings of the IEEK Conference
    • /
    • 2004.08c
    • /
    • pp.519-523
    • /
    • 2004
  • In this paper we challenge the user Authentication using KerberosV5 authentication protocol in WPKI environment. This paper is the security structure that defined in a WAP forum and security and watches all kinds of password related technology related to the existing authentication system. It looks up weakness point on security with a problem on the design that uses wireless public key based structure and transmission hierarchical security back of a WAP forum, and a server client holds for user authentication of an application layer all and all, and it provides one counterproposal. Therefore, We offer authentication way solution that connected X.509 V3 with using WIM for complement an authentication protocol KerberosV5 and its disadvantages.

  • PDF

Effective Authentication Method for Hierarchical Patch Distribution (범용 운영체제를 위한 계층적 패치 분배 구조에서의 효과적인 시스템 인증 방법)

  • Bae, Seong-Jae;Jung, Man-Hyun;Cho, Jae-Ik;Moon, Jong-Sub
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2007.10d
    • /
    • pp.108-111
    • /
    • 2007
  • 네트워크가 광범위하게 발달함에 따라 악의적인 공격도 늘어나고 있다. 악의적인 공격을 막는 방법으로 침입을 차단하는 프로그램을 설치하는 것 외에도 시스템을 패치하는 것은 중요한 부분을 차지한다. 패치 분배 시스템은 대규모 네트워크 상의 시스템에 패치를 분배할 때 부하 분산을 하기 위하여 계층적 구조로 설계된다. 본 논문에서는 계층적 패치 분배 구조에서 상위 계승이 하위 계층을 효과적으로 인증하기 위한 방법을 제안한다.

  • PDF

Design of Kerberos Authentication Mechanism based on WPKI (WPKI 기반 Kerberos 인증 메커니즘 설계)

  • Lee, Cheol-Seung;Park, Chan-Mo;Lee, Ho-Young;Lee, Joon
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.7 no.5
    • /
    • pp.986-992
    • /
    • 2003
  • In this paper we challenge the user Authentication using Kerberos V5 authentication protocol in WPKI environment. this paper is the security structure that defined in a WAP forum and security and watches all kinds of password related technology related to the existing authentication system. It looks up weakness point on security with a p개blem on the design that uses wireless public key-based structur and transmission hierarchical security back of a WAP forum, and a server-client holds for user authentication of an application level all and all, and it provides one counterproposal. Therefore, We offer authentication way solution that connected X.509 V3 with using WIM for complement an authentication protocol Kerberos V5 and its disadvantages.

An Efficient Hierarchical Software Architecture Expression Method for Patch Distribution System (패치분배 시스템을 위한 효과적인 계층적 소프트웨어 아키텍처 표현 방안)

  • Lee, Suyoung;Lee, Inyong;Cho, Jaeik;Moon, Jongsub
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2007.11a
    • /
    • pp.1186-1189
    • /
    • 2007
  • 소프트웨어 아키텍처는 설계자가 요구하는 사항을 개발자에게 전달하기 위해 사용된다. 많은 아키텍처 방안들은 코드 의존적으로 만들어 졌다. 이는 설계자가 요구하는 사항을 개발자에게 충분히 전달할 수 없다. 또한 현재 많은 네트워크 시스템들은 웹 환경을 포함하고 있기 때문에 본 논문에서는 웹 환경을 포함하고 설계자와 개발자간에 명확한 의사소통을 위해 사용될 수 있는 아키텍처 구성 방안을 제시 한다. 그리고 현재 많은 소프트웨어 취약점으로 인해 보안적인 문제를 가지고 있다. 따라서 불가피하게 패치를 개발하고 분배하는 방법을 필요로 한다. 현재 패치 분배 시스템의 개발은 타기종간의 분산 환경 및 패치 환경 그리고 웹의 개발에 의해서 복잡해 진다. 그래서 제안한 방안을 이용해 패치 분배 시스템을 구성 하여 제시한 방안에 의해 효율적으로 수행해 볼 것이다.

  • PDF

Access Control to XML Documents Based on Hierarchical Key Assignment Scheme (계층적 키 할당 기법을 기반으로 하는 XML 문서의 접근제어)

  • Ban, Yong-Ho;Kim, Jong-Hun
    • Journal of Korea Multimedia Society
    • /
    • v.8 no.11
    • /
    • pp.1520-1530
    • /
    • 2005
  • As XML is recognized as a prevalent standard for document representation and exchange in the Internet, the need for security of XML becomes very important issue. Until now researches on XML security have been focused on confidentiality or integrity like encryption and digital signature technology. But, as XML data becomes more massive and complicated, it requires managerial security that decided access permit or deny by the authority oi user who is using the XML data. Thus it requires models and mechanisms enabling the specification and enforcement of access control policies for XML documents. In this paper, we suggest the new access control model and mechanism that separate XML documents by access level, assign roles to each user by applying Role Based Access Control (RBAC) and perform access control to specific documents by encrypting each section with roles. The method, we suggested, has an advantage that it does not need to update the whole keys used in encryption process by updating only the relations between appropriate secure layers.

  • PDF