• Title/Summary/Keyword: Information Centric Network

Search Result 347, Processing Time 0.028 seconds

Detection Model of Malicious Nodes of Tactical Network for Korean-NCW Environment (한국형 NCW를 위한 전술네트워크에서의 악의적인 노드 검출 모델)

  • Yang, Ho-Kyung;Cha, Hyun-Jong;Shin, Hyo-Young;Ryou, Hwang-Bin;Jo, Yong-Gun
    • Convergence Security Journal
    • /
    • v.11 no.1
    • /
    • pp.71-77
    • /
    • 2011
  • NCW(Network Centric- Warfare) encompasses the concept to use computer data processing and network linkage communications techniques, share information and furthermore, enhance the effectiveness of computer-operating systems. As IT(Information & Technology) have become developed in the recent years, the existing warfare system-centered conventional protocol is not use any longer. Instead, network-based NCW is being widely-available, today. Under this changing computer environment, it becomes important to establish algorithm and build the stable communication systems. Tools to identify malign node factors through Wireless Ad-hoc network cause a tremendous error to analyze and use paths of even benign node factors misreported to prove false without testing or indentifying such factors to an adequate level. These things can become an obstacle in the process of creating the optimum network distribution environment. In this regard, this thesis is designed to test and identify paths of benign node factors and then, present techniques to transmit data through the most significant open short path, with the tool of MP-SAR Protocol, security path search provider, in Ad-hoc NCW environment. Such techniques functions to identify and test unnecessary paths of node factors, and thus, such technique users can give an easy access to benign paths of node factors.

A Study of Pervasive Roaming Services with Security Management Framework (퍼베이시브 로밍 서비스를 위한 보안 관리 프레임워크)

  • Kim, Gwan-Yeon;Hwang, Zi-On;Kim, Yong;Uhm, Yoon-Sik;Park, Se-Hyun
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.17 no.4
    • /
    • pp.115-129
    • /
    • 2007
  • The ubiquitous and autonomic computing environments is open and dynamic providing the universal wireless access through seamless integration of software and system architectures. The ubiquitous computing have to offer the user-centric pervasive services according to the wireless access. Therefore the roaming services with the predefined security associations among all of the mobile devices in various networks is especially complex and difficult. Furthermore, there has been little study of security coordination for realistic autonomic system capable of authenticating users with different kinds of user interfaces, efficient context modeling with user profiles on Smart Cards, and providing pervasive access service by setting roaming agreements with a variety of wireless network operators. This paper proposes a Roaming Coordinator-based security management framework that supports the capability of interoperator roaming with the pervasive security services among the push service based network domains. Compared to traditional mobile systems in which a Universal Subscriber Identity Module(USIM) is dedicated to one service domain only, our proposed system with Roaming Coordinator is more open, secure, and easy to update for security services throughout the different network domains such as public wireless local area networks(PWLANs), 3G cellular networks and wireless metropolitan area networks(WMANs).

Study on Developmental Strategy of National Defense & IT Convergence (국방IT융합기술의 발전전략에 관한 연구)

  • Koo, Han Lim;Kim, Seong Min;Rhee, Woo Seop
    • Convergence Security Journal
    • /
    • v.14 no.6_1
    • /
    • pp.99-112
    • /
    • 2014
  • National Defense & IT Convergence is ensuring actual force integration by developing new IT Convergence Technology for the purpose of realizing the concept of Network Centric Warfare. The Ministry of Defense has appointed National Defense & IT Convergence Center of Defense Agency for Technology and Quality as a specialized agency for the National Defense & IT Convergence development, a mission in the creative economy era and has been active in military demand inquiry and prior technology plan with the industrial-academic research institute for discovery of National Defense IT Convergence projects based on the Convergence Center. Further, it is promoting focused on the timely introduction of private IT new technology by operating the project planning team comprised of defense domain specialists and by applying the advanced planning method etc. Accordingly, for the development of National Defense & IT convergence, developmental strategy is urgently required to be utilized effectively after considering theoretically on the national IT Convergence policy enforcement and phenomenon of National Defense & IT Convergence technology and analyzing them comprehensively. This thesis promotes in phases the IT Convergence projects which are identified for the development, improves the efficiency of newly created National Defense & IT Convergence center and suggests training program of IT Convergence personnel related to the defense reforms. With such, it will achieve smart defense in advance and will also contribute largely for the realization of the immediate paradigm shift and of the creative economy.

A Study on Models for Technical Security Maturity Level Based on SSE-CMM (SSE-CMM 기반 기술적 보안 성숙도 수준 측정 모델 연구)

  • Kim, Jeom Goo;Noh, Si Choon
    • Convergence Security Journal
    • /
    • v.12 no.4
    • /
    • pp.25-31
    • /
    • 2012
  • The SSE-CMM model is how to verify the level of information protection as a process-centric information security products, systems and services to develop the ability to assess the organization's development. The CMM is a model for software developers the ability to assess the development of the entire organization, improving the model's maturity level measuring. However, this method of security engineering process improvement and the ability to asses s the individual rather than organizational level to evaluate the ability of the processes are stopped. In this research project based on their existing research information from the technical point of view is to define the maturity level of protection. How to diagnose an information security vulnerabilities, technical security system, verification, and implementation of technical security shall consist of diagnostic status. The proposed methodology, the scope of the work place and the current state of information systems at the level of vulnerability, status, information protection are implemented to assess the level of satisfaction and function. It is possible that measures to improve information security evaluation based on established reference model as a basis for improving information security by utilizing leverage.

A Study on plan for promoting innovation and utilization of information sharing (공공정보 활용의 기술적 방법과 정보서비스의 정책적 함의)

  • Kim, Youngmi
    • Journal of Digital Convergence
    • /
    • v.12 no.4
    • /
    • pp.43-49
    • /
    • 2014
  • Paradigm shift in government services means the evolution to the service with active participation based on information technology. Opening public information proceeds to an extent that private sector participation can be a basis and driving force, and extends to a stage that free and practical use is possible for private sector. Therefore, the government is preparing for legal and institutional foundation for various fields. The government needs to build open network from user-oriented point of view rather than provider-centric point of view, improve communication, and change the way of working due to the fact that flexible and rapid business process is required. It is time to prepare development plans for public the functions of platform-type government that public sector can participate in the role of government, create new value, and give rise to innovation in order to change the functionality of the government and meet the new needs of citizen. This study tries to analyze platform-type government and to study efficient role allocation for sharing resources including informant and system between the government and the private sector, focusing on innovation of public information sharing.

Evaluation of Facilitating Factors for Cloud Service by Delphi Method (델파이 기법을 이용한 클라우드 서비스의 개념 정의와 활성화 요인 분석)

  • Suh, Jung-Han;Chang, Suk-Gwon
    • Journal of Information Technology Services
    • /
    • v.11 no.2
    • /
    • pp.107-118
    • /
    • 2012
  • Recently, as the clouding computing begins to receive a great attention from people all over the world, it became the most popular buzz word in recent IT magazines or journal and heard it in many different services or different fields. However, a notion of the cloud service is defined vaguely compared to increasing attentions from others. Generally the cloud service could be understood as a specific service model base on the clouding computing, but the cloud, the cloud computing, the cloud computing service and cloud service, these four all terms are often used without any distinction of its notions and characteristics so that it's difficult to define the exact nature of the cloud service. To explore and analyze the cloud service systematically, an accurate conception and scope have to be preceded. Therefore this study is to firstly clarify its definition by Delpi method using expert group and then tries to provide the foundation needed to enable relative research such as establishing business model or value chain and policies for its activation to set off. For the Delpi, 16 experts participated in several surveys from different fields such industry, academy and research sector. As a result of the research, Characteristics of the Cloud Service are followings : Pay per use, Scalability, Internet centric Virtualization. And the scope as defined including Grid Computing, Utility Computing, Server Based Computing, Network Computing.

Performance Analysis of Unmanned Robot System based on LOS/NLOS channel (LOS/NLOS 채널에 따른 무인로봇체계의 시스템 성능분석)

  • Song, Yuchan;Cha, Gyeong Hyeon;Hwang, Yu Min;Lee, Jae-Seang;Han, Myoung-hun;Kim, Jin Young;Shin, Yoan
    • Journal of Satellite, Information and Communications
    • /
    • v.10 no.4
    • /
    • pp.12-16
    • /
    • 2015
  • Unmanned robot system has become a significant part of network centric warfare. Unnlike the commercial wireless system, however, it is tricky to provide reliable communication in the harsh environment: tactical and military communication. Therefore, it needs to be considered when the base station and mobile has poor communication channel. In this paper, we proposed an efficient operating algorithm for unammned robot system with ensuring communication survivability in the harsh environment. From the simulation, we adopted the SUI channel suitable for domestic mountainous area and open terrain with Rician factor K.

Design and Analysis of the Data Distribution Service System (데이타 분배 서비스 시스템 설계 및 분석)

  • Park, Choong-Bum;Kwon, Ki-Jeong;Cha, Da-Ham;Choi, Hoon;Kim, Chum-Su
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.14 no.2
    • /
    • pp.211-215
    • /
    • 2008
  • the data-centric publish/subscribe middle-ware is suitable for a communication environment in which various devices dynamically forms a network domain and same type of data are frequently exchanged. For this purpose, OMG has standardized DDS (Data Distribution Service) specification. In this study, we designed the RiTiCoM, data distribution service system that observes the OMG DDS (Data Distribution Service) standard specification and supports the automation of system management, and analyzed the performance and compared with the JMS.

Inter-Cell Interference Management for Next-Generation Wireless Communication Systems

  • Kwon, Ho-Joong;Ko, Soo-Min;Seo, Han-Byul;Lee, Byeong-Gi
    • Journal of Communications and Networks
    • /
    • v.10 no.3
    • /
    • pp.258-267
    • /
    • 2008
  • In this paper, we examine what changes the next-generation wireless communication systems will experience in terms of the technologies, services, and networks and, based on that, we investigate how the inter-cell interference management should evolve in various aspects. We identify that the main driving forces of the future changes involve the data-centric services, new dynamic service scenarios, all-IP core access networks, new physical-layer technologies, and heavy upload traffic. We establish that in order to cope with the changes, the next-generation inter-cell interference management should evolve to 1) set the objective of providing a maximal data rate, 2) take the form of joint management of power allocation and user scheduling, 3) operate in a fully distributed manner, 4) handle the time-varying channel conditions in mobile environment, 5) deal with the changes in interference mechanism triggered by the new physical-layer technologies, and 6) increase the spectral efficiency while avoiding centralized coordination of resource allocation of the users in the uplink channel.

Experimental Evaluation of Unmanned Aerial Vehicle System Software Based on the TMO Model

  • Park, Han-Sol;Kim, Doo-Hyun;Kim, Jung-Guk;Chang, Chun-Hyon
    • Journal of Computing Science and Engineering
    • /
    • v.2 no.4
    • /
    • pp.357-374
    • /
    • 2008
  • Over the past few decades, a considerable number of studies have been conducted on the technologies to build an UAV (Unmanned Aerial Vehicle) control system. Today, focus in research has moved from a standalone control system towards a network-centric control system for multiple UAV systems. Enabling the design of such complex systems in easily understandable forms that are amenable to rigorous analysis is a highly desirable goal. In this paper, we discuss our experimental evaluation of the Time-triggered Message-triggered Object (TMO) structuring scheme in the design of the UAV control system. The TMO scheme enables high-level structuring together with design-time guaranteeing of accurate timings of various critical control actions with significantly smaller efforts than those required when using lower-level structuring schemes based on direct programming of threads, UDP invocations, etc. Our system was validated by use of environment simulator developed based on an open source flight simulator named FlightGear. The TMO-structured UAV control software running on a small computing platform was easily connected to a simulator of the surroundings of the control system, i.e., the rest of the UAV and the flight environment. Positive experiences in both the TMO-structured design and the validation are discussed along with potentials for future expansion in this paper.