• Title/Summary/Keyword: Information Security Strategy

Search Result 474, Processing Time 0.031 seconds

A Multistage Authentication Strategy for Reliable N-to-N Communication in CGSR based Mobile Ad Hoc Networks (CGSR 기반의 이동 애드 흑 네트워크에서 신뢰성 있는 통신을 위한 노드간 인증 기법)

  • Lee Hyewon K.;Mun Youngsong
    • Journal of KIISE:Information Networking
    • /
    • v.32 no.6
    • /
    • pp.659-667
    • /
    • 2005
  • A Mobile Ad Hoc Network(MANET) is a multi hop wireless network with no prepared base stations or centralized administrations, where flocks of peer systems gather and compose a network. Each node operates as a normal end system in public networks. In addition to it, a MANET node is required to work as a router to forward traffic from a source or intermediate node to others. Each node operates as a normal end system in public networks, and further a MANET node work as a router to forward traffic from a source or intermediate node to the next node via routing path. Applications of MANET are extensively wide, such as battle field or any unwired place; however, these are exposed to critical problems related to network management, node's capability, and security because of frequent and dynamic changes in network topology, absence of centralized controls, restricted usage on network resources, and vulnerability oi mobile nodes which results from the special MANET's character, shared wireless media. These problems induce MANET to be weak from security attacks from eavesdropping to DoS. To guarantee secure authentication is the main part of security service In MANET because networks without secure authentication are exposed to exterior attacks. In this paper, a multistage authentication strategy based on CGSR is proposed to guarantee that only genuine and veritable nodes participate in communications. The proposed authentication model is composed of key manager, cluster head and common nodes. The cluster head is elected from secure nodes, and key manager is elected from cluster heads. The cluster head will verify other common nodes within its cluster range in MANET. Especially, ID of each node is used on communication, which allows digital signature and blocks non repudiation. For performance evaluation, attacks against node authentication are analyzed. Based on security parameters, strategies to resolve these attacks are drawn up.

The Relationship between Labor Market Flexibility and Outcome Variables and Its Moderating Effect on Union Power (노동시장의 유연성과 결과변수와의 관계 및 노조 힘의 조절효과)

  • Bae, Seung-Hyun;Park, Se-Yul
    • Management & Information Systems Review
    • /
    • v.30 no.4
    • /
    • pp.475-509
    • /
    • 2011
  • Taking 195 Korean businesses and sorting them out according to the unit types, this study looks into how flexibility strategy in labor market, which consists of numerical flexibility and functional flexibility, takes effect on the organization's outcome variable, which in turn consists of productivity, labor-management cooperation, and job security. In addition, the present study analyzes the role of labor union's moderating effect on the relationship among labor market flexibility, labor-management cooperation, and job security. It is found out as a result that numerical flexibility has no meaningful relation with productivity, labor-management cooperation, and job security, while functional flexibility has a considerably positive relation with them. This result confirms the importance of functional flexibility of business strategy in labor market. The West has continuously insisted the importance of functional flexibility, pointing out problems of numerical flexibility. On the other hand, considering that this study has confirmed functional flexibility's meaningful relation, while it has not found out numerical flexibility's negative relation, it is necessary to study further on the relationship between these two kinds of flexibility. The result of analysis on the role of union power's moderating effect confirms only the union power's interaction effect in the relation between numerical flexibility and labor-management cooperation. The possibility of union's opportunistic behavior can be detected in this result.

  • PDF

A Study on Facilitators and Inhibitors to the Introduction of Outsourcing in the Hospital Information Systems in Korea (병원 정보시스템 아웃소싱 도입의 촉진 요인과 저해 요인에 관한 연구)

  • Choy, Soon;Shin, Hyeong-Sik;Choi, In-Young;Kim, Suk-Il
    • Journal of Preventive Medicine and Public Health
    • /
    • v.40 no.1
    • /
    • pp.64-70
    • /
    • 2007
  • Objectives : This study was conducted to investigate the current status of outsourcing in Korean hospital information systems and the factors influencing its introduction. Methods : The authors surveyed 136 hospitals located in Seoul and its surrounding vicinities from June 7 to June 23, 2006. The facilitators and inhibitors to outsourcing in hospital information systems were derived from literature and expert reviews. Multiple logistic regression analysis was applied to identify the major influencing factors on outsourcing in hospital information systems. Results : Eighty-six (63.2%) of the 136 hospitals surveyed, which were mainly tertiary hospitals, responded to using outsourcing for their hospital information systems. "Hardware and software maintenance and support," "application development," and "management of service and staff" were the major areas of outsourcing. Outsourcing had been employed for $4\sim7$ years by 45.5% of the hospitals and the proportion of the budget used for outsourcing was less than 20%. A need for an extension in outsourcing was agreed on by 76.5% of the hospitals. The multiple logistic regression analysis showed that both consumer satisfaction and security risk have an influence on hospital information system outsourcing. Conclusions : Outsourcing in hospital information systems is expected to increase just as in other industries. One primary facilitator to outsourcing in other industries is consumer satisfaction. We found that this was also a facilitator to outsourcing in hospital information systems. Security risk, which is usually considered an inhibitor to information technology outsourcing, was proven to be an inhibitor here as well. The results of this study may help hospital information systems establish a strategy and management plan for outsourcing.

A study on DVB-SI based additional information transmission method of data service linked with movie information TV program (영화정보 프로그램 연동형 데이터서비스의 DVB-SI 기반 부가정보 전송 방법에 관한 연구)

  • Kwangilm KO
    • Convergence Security Journal
    • /
    • v.22 no.2
    • /
    • pp.91-98
    • /
    • 2022
  • Because the movie has the characteristics of a cultural product where experience is important, a promotional strategy is used to convert viewers into movie audiences by providing indirect experiences of movies through professional movie information programs. Considering that the movie information program is a strategic publicity medium that raises the audience's intention to watch a movie, a study on the data service that provides useful additional information to the viewer in conjunction with the movie information program is meaningful. Against this background, this study contains the core research contents in the development of data service linked with movie information program. Specifically, additional information of the movie information program was defined. And to provide the additional information to the data service, the digital broadcasting international standard DVB-SI-based additional information transmission method was devised.

A Study of the Factors Affecting Adoption of a Mobile RFID : Focused on the Technology Area of Mobile RFID (모바일 RFID의 특성이 실제 사용의도에 미치는 영향에 관한 연구)

  • Lee, Da Hoon;Cho, Sung Min;Whang, Jaehoon
    • Journal of Information Technology Applications and Management
    • /
    • v.20 no.1
    • /
    • pp.67-85
    • /
    • 2013
  • The emergence of RFID markets and development of various RFID-embedded mobile devices has brought fundamental changes to our lives. As the availability of RFID readers and tags that are implanted in smart phones and table PCs increases, information on RFID-affixed objects can be tracked wirelessly and this had open possibilities for B2B businesses to be run like B2C businesses. However, given the popularity of the RFID markets, there is limited research in this area. This paper serves to develop an extended technology acceptance model by Mobile RFID characteristics (perceived cost, security, instant connectivity, context awareness, and result demonstrability) examines the determinant factors that cause the acceptance of mobile RFID. To do so, the study conducted a survey targeting smart phone users and used the PLS path modeling, one of the structural equation models to verify the significance of research hypothesis. As a result, perceived cost, instant connectivity, context awareness, and result demonstrability turned out to have a real effect on intention to use mobile RFID by means of perceived usefulness and perceived ease of use. Security turned out to have a partial effect on intention to use mobile RFID by means of perceived usefulness or perceived ease of Use.

A Randomness Test by the Entropy (Entropy에 의한 Randomness 검정법)

  • 최봉대;신양우;이경현
    • Proceedings of the Korea Institutes of Information Security and Cryptology Conference
    • /
    • 1991.11a
    • /
    • pp.105-133
    • /
    • 1991
  • 본 논문에서는 임의의 이진 난수발생기의 source가 $BMS_{p}$ 이거나 M-memory를 갖는 마르코프연쇄로 모델화 되었을 경우에 비트당 entropy와 관련이 있는 새로운 randomness에 관한 통계적 검정법을 제안한다. 기존에 알려진 이진 난수발생기의 randomness검정법이 0또는 1의 분포의 편향성(bias)이나 연속된 비트간의 상관성(correlation)중의 한 종류만의 non-randomness를 추적해낼 수 있는 반면에 새로운 검정법은 위의 두가지 검정을 통과하였을 때 암호학적으로 중요한 측도인 비트당 entropy 를 측정하여 암호학적인 약점을 검정할 수 있다. 또한 대칭(비밀키) 암호시스템의 통계적 결점을 바탕으로 하여 키를 찾는 공격자의 최적 전략( optimal strategy)문제를 분석하여 이 최적 전략이 이진 수열의 비트당 entropy와 밀접한 관계가 있음을 보이고 이 비트당 entropy와 관련이 있는 새로운 통계량을 도입하여 이진 난수 발생기의 source의 이진수열이 다음 3가지 경우, 즉, i.i.d. symmetric인 경우, $BMS_{p}$ 인 경우, M-memory를 갖는 마르코프연쇄인 경우의 각각에 대하여 특성을 조사하고 새로운 통계량의 평균과 분산을 구한다. 이때 구한 새로운 통계량은 잘 알려진 중심 극한 정리에 의하여 근사적으로 정규분포를 따르므로 위의 평균과 분산을 이용하여 스트림 암호시스템에서 구성요소로 많이 사용되는 몇 몇 간단한 이진 난수 발생기에 적용하여 통계적 검정을 실시함으로써 entropy 관점의 검정법이 새로운 randomness 검정법으로 타당함을 보인다.

  • PDF

A Study on North Korea's Cyber Attacks and Countermeasures (북한의 사이버공격과 대응방안에 관한 연구)

  • Chung, Min Kyung;Lim, Jong In;Kwon, Hun Yeong
    • Journal of Information Technology Services
    • /
    • v.15 no.1
    • /
    • pp.67-79
    • /
    • 2016
  • This study aims to present the necessary elements that should be part of South Korea's National Defense Strategy against the recent North Korean cyber-attacks. The elements proposed in this study also reflect the recent trend of cyber-attack incidents that are happening in the Unites States and other countries and have been classified into the three levels of cyber incidents: cyberwarfare, cyberterrorism and cybercrime. As such, the elements proposed are presented in accordance with this classification system. In order to properly take into account the recent trend of cyber-attacks perpetrated by North Korea, this paper analyzed the characteristics of recent North Korean cyber-attacks as well as the countermeasures and responses of South Korea. Moreover, by making use of case studies of cyber-attack incidents by foreign nations that threaten national security, the response measures at a national level can be deduced and applied as in this study. Thus, the authors of this study hope that the newly proposed elements here within will help to strengthen the level of Korea's cyber security against foreign attacks, specifically that of North Korea such as the KHNP hacking incidents and so on. It is hoped that further damage such as leakage of confidential information, invasion of privacy and physical intimidation can be mitigated.

Efficient Top-k Join Processing over Encrypted Data in a Cloud Environment

  • Kim, Jong Wook
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.10 no.10
    • /
    • pp.5153-5170
    • /
    • 2016
  • The benefit of the scalability and flexibility inherent in cloud computing motivates clients to upload data and computation to public cloud servers. Because data is placed on public clouds, which are very likely to reside outside of the trusted domain of clients, this strategy introduces concerns regarding the security of sensitive client data. Thus, to provide sufficient security for the data stored in the cloud, it is essential to encrypt sensitive data before the data are uploaded onto cloud servers. Although data encryption is considered the most effective solution for protecting sensitive data from unauthorized users, it imposes a significant amount of overhead during the query processing phase, due to the limitations of directly executing operations against encrypted data. Recently, substantial research work that addresses the execution of SQL queries against encrypted data has been conducted. However, there has been little research on top-k join query processing over encrypted data within the cloud computing environments. In this paper, we develop an efficient algorithm that processes a top-k join query against encrypted cloud data. The proposed top-k join processing algorithm is, at an early phase, able to prune unpromising data sets which are guaranteed not to produce top-k highest scores. The experiment results show that the proposed approach provides significant performance gains over the naive solution.

Text Mining in Online Social Networks: A Systematic Review

  • Alhazmi, Huda N
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.3
    • /
    • pp.396-404
    • /
    • 2022
  • Online social networks contain a large amount of data that can be converted into valuable and insightful information. Text mining approaches allow exploring large-scale data efficiently. Therefore, this study reviews the recent literature on text mining in online social networks in a way that produces valid and valuable knowledge for further research. The review identifies text mining techniques used in social networking, the data used, tools, and the challenges. Research questions were formulated, then search strategy and selection criteria were defined, followed by the analysis of each paper to extract the data relevant to the research questions. The result shows that the most social media platforms used as a source of the data are Twitter and Facebook. The most common text mining technique were sentiment analysis and topic modeling. Classification and clustering were the most common approaches applied by the studies. The challenges include the need for processing with huge volumes of data, the noise, and the dynamic of the data. The study explores the recent development in text mining approaches in social networking by providing state and general view of work done in this research area.

GT-PSO- An Approach For Energy Efficient Routing in WSN

  • Priyanka, R;Reddy, K. Satyanarayan
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.4
    • /
    • pp.17-26
    • /
    • 2022
  • Sensor Nodes play a major role to monitor and sense the variations in physical space in various real-time application scenarios. These nodes are powered by limited battery resources and replacing those resource is highly tedious task along with this it increases implementation cost. Thus, maintaining a good network lifespan is amongst the utmost important challenge in this field of WSN. Currently, energy efficient routing techniques are considered as promising solution to prolong the network lifespan where multi-hop communications are performed by identifying the most energy efficient path. However, the existing scheme suffer from performance related issues. To solve the issues of existing techniques, a novel hybrid technique by merging particle swarm optimization and game theory model is presented. The PSO helps to obtain the efficient number of cluster and Cluster Head selection whereas game theory aids in finding the best optimized path from source to destination by utilizing a path selection probability approach. This probability is obtained by using conditional probability to compute payoff for agents. When compared to current strategies, the experimental study demonstrates that the proposed GTPSO strategy outperforms them.