• Title/Summary/Keyword: Information security industry

검색결과 963건 처리시간 0.021초

ZCN과 N2N 인증 기법을 이용한 패킷 전송에 대한 신뢰성 향상에 관한 연구 (A Study on Trust Improvement of Packets Transmission using ZCN and N2N Authentication Technique)

  • 양환석
    • 디지털산업정보학회논문지
    • /
    • 제11권4호
    • /
    • pp.61-68
    • /
    • 2015
  • MANET has various vulnerability in wireless network and is more vulnerable in security because central management is not performed. In particular, routing attack may decrease performance of the overall network because the mobile node acts as a router. In this paper, we proposed authentication technique for improving the reliability of the network by increasing the integrity of the routing control packet and blocking effectively attacks that occur frequently in the inside. The proposed technique is consisted of two authentication methods of ZCN and N2N. ZCN authentication method is to elect CA nodes and monitor the role of the CA nodes. N2N authentication method is for an integrity check on the routing packets between nodes. Index key is determined by combining the hop count value to shared key table issued from CA in order to increase the robustness of the internal attack. Also, the overhead of key distribution was reduced by distributing a shared key to nodes certificated from CA. The excellent performance of the proposed method was confirmed through the comparison experiments.

신용카드의 안전성 향상을 위한 구조 및 거래절차 개선방법 (A Reform Measure of the Structure and Transaction Process for the Safety Improvement of a Credit Card)

  • 이영교;안정희
    • 디지털산업정보학회논문지
    • /
    • 제7권3호
    • /
    • pp.63-74
    • /
    • 2011
  • Credit cards are more convenient than cash of heavy. Therefore, credit cards are used widely in on_line (internet) and off_line in nowadays. To use credit cards on internet is commonly secure because client identification based security card and authentication certificate. However, to use in off_line as like shop, store, department, restaurant is unsecure because of irregular accident. As client identification is not used in off_line use of credit cards, the irregular use of counterfeit, stolen and lost card have been increasing in number recently. Therefore, client identification is urgently necessary for secure card using in off_line. And the method of client identification must be simple, don't take long time, convenient for client, card affiliate and card company. In this paper, we study a reform measure of the structure and transaction process for the safety improvement of a credit cards. And we propose several authentication method of short-and long-term for client identification. In the proposal, the client authentication method by OTP application of smart-phone is efficient nowadays.

Wireless Ad Hoc Network환경에서의 라우팅 공격 대응 기법에 관한 연구 (A Study on Response Technique of Routing Attack under Wireless Ad Hoc Network. Environment)

  • 양환석
    • 디지털산업정보학회논문지
    • /
    • 제10권1호
    • /
    • pp.105-112
    • /
    • 2014
  • The utilization of Wireless Ad Hoc Network which can build easily network using wireless device in difficult situation to build network is very good. However, it has security threat element because it transfers data by only forwarding of wireless devices. The measures against this should be prepared because damage by especially routing attack can affect the entire network. It is hard to distinguish malicious node and normal node among nodes composing network and it is not easy also to detect routing attack and respond to this. In this paper, we propose new method which detect routing attack and can respond to this. The amount of traffic in all nodes is measured periodically to judge the presence or absence of attack node on the path set. The technique that hides inspection packet to suspected node and transmits is used in order to detect accurately attack node in the path occurred attack. The experiment is performed by comparing SRAODA and SEAODV technique to evaluate performance of the proposed technique and the excellent performance can be confirmed.

모바일 투표의 문제점 및 이를 극복하기 위한 모바일 투표 시스템 요구사항 - 문헌 사례 연구와 인터넷 설문 중심으로 (Problems of Mobile Voting and System Requirements for the Solutions: Literature Review and Internet Survey)

  • 최종명;김나영;하상복;임양준;손영우;고형대
    • 디지털산업정보학회논문지
    • /
    • 제9권1호
    • /
    • pp.33-42
    • /
    • 2013
  • Mobile voting has been considered as a promising technology, but it has not been used widely or popular enough in the world. We think this situation is caused by immature technologies of mobile voting and no agreement among people in our society. In this paper, we reviewed literature on electronic voting systems in order to find out technical issues on mobile voting system, and we also surveyed people's opinions via the Internet in order to understand what they worry about mobile voting. From the literature review, we understand that the existing electronic voting systems did not consider security, robustness, and reliability issues enough. From the survey, we also get to know that people worry about "manipulation of the result of mobile voting" mostly. Our work can help researchers on mobile voting to consider the ways or technologies that convince people of the reliability of mobile voting.

IT기반 분산전원 연계 배전계통의 최적전압조정에 관한 연구 (A study for IT Based Optimal Voltage Control Method of Distribution Systems with Distributed Generation)

  • 김정년;백영식;서규석
    • 대한전기학회논문지:전력기술부문A
    • /
    • 제55권4호
    • /
    • pp.139-143
    • /
    • 2006
  • Recently, standard of living improved and Information-Communication industry developed rapidly. Thereby, interest about electric power quality is rising worldwide. So, research and Development to enhance electric power quality in various viewpoint until most suitable supply system from each kind device to improve electric power quality. And specially, interest about voltage quality is rising by diffusion increase of information communication appliance and minuteness control appliance etc. Also Power consumption is increasing, but expansion of large size generator by environmental and site security problem is difficult. So, introduction of distribution generation is investigated actively by electric-power industry reorganization. Voltage management of power system had been controlled by ULTC (Under Load Tap Changer) in substation and pole transformer on the high voltage distribution line. But, voltage control device on substation and distribution line is applied each other separatively. Therefore, efficiency of line voltage control equipment is dropping. Also, research about introduction upper limit of distribution generation is consisting continuously. This paper presents cooperation use way between voltage control device and introduction upper limit of distribution generation for most suitable voltage control in distribution power system.

Nine Obstacles to Overcome Y2K Problem in U.S. Banking Industry

  • Sangjin Yoo;Lee, Choong kwon;Kumari Ryali
    • 한국산업정보학회논문지
    • /
    • 제4권1호
    • /
    • pp.7-19
    • /
    • 1999
  • 곧 다가올 서기 2000년이 되면 많은 프로그램들이 작성 될 때 고려하지 못했던 연도 인식문제로 인하여 정보시스템을 개발해서 운영하고 있는 많은 조직들이 고통을 겪을 것으로 예상되고 있다. 특히 금융계는 정보시스템이 업무에서 차지하는 비중에 비추어 볼 때 사소한 문제라도 엄청난 파장을 일으킬 것으로 믿어진다. 이러한 의미에서 본 논문은 미국의 금융계가 소위 Y2K라 불리우는 서기 2000년 인식상의 문제를 극복하는데 우선 고려해야 할 9가지 장애를 소개하고자 한다.

  • PDF

빅데이터 연구동향 분석: 토픽 모델링을 중심으로 (Research Trends Analysis of Big Data: Focused on the Topic Modeling)

  • 박종순;김창식
    • 디지털산업정보학회논문지
    • /
    • 제15권1호
    • /
    • pp.1-7
    • /
    • 2019
  • The objective of this study is to examine the trends in big data. Research abstracts were extracted from 4,019 articles, published between 1995 and 2018, on Web of Science and were analyzed using topic modeling and time series analysis. The 20 single-term topics that appeared most frequently were as follows: model, technology, algorithm, problem, performance, network, framework, analytics, management, process, value, user, knowledge, dataset, resource, service, cloud, storage, business, and health. The 20 multi-term topics were as follows: sense technology architecture (T10), decision system (T18), classification algorithm (T03), data analytics (T17), system performance (T09), data science (T06), distribution method (T20), service dataset (T19), network communication (T05), customer & business (T16), cloud computing (T02), health care (T14), smart city (T11), patient & disease (T04), privacy & security (T08), research design (T01), social media (T12), student & education (T13), energy consumption (T07), supply chain management (T15). The time series data indicated that the 40 single-term topics and multi-term topics were hot topics. This study provides suggestions for future research.

공공조직 생산성 측정사례 및 결과 활용에 관한 연구 : 지방자치단체 생산성지수 중심 (A Study on the Use of Results and Measurement Case of Productivity of the Public Organization)

  • 김완평
    • 디지털산업정보학회논문지
    • /
    • 제10권4호
    • /
    • pp.225-236
    • /
    • 2014
  • Productivity of public organizations was far older due to issue more difficult to measure than private organizations. Unlike the private sector, the public sector is a diverse and sometimes conflicting objectives (efficiency, effectiveness, equity, democracy, etc.) exist, it is difficult to measure productivity in a single index. Many departments of government is intricately interrelated and sometimes produced by the joint efforts, it is difficult to allocate performance, incentives and accountability to among departments. And there is the difficulty of collecting data on the productivity indicators of public organizations. Despite these difficulties, we developed a productivity index system and measuring method to systematically introduce the concept of productivity in the local administration. In this paper, the productivity and the productivity index measurement practices of local governments conducted annually from 2011 on was deep into research. First, the report found examples of the governments of the developed countries, productivity measurement, then the way MOPAS(Ministry of Public Administration and Security) measure productivity index of local governments, success factors, the implications were in-depth analysis. Finally, in order to enhance productivity and competitiveness municipalities studied ways to take advantage of the productivity index.

키워드 빈도와 중심성 분석을 이용한 사물인터넷 및 스마트 시티 연구 동향: 미국·일본·한국을 중심으로 (Research Trend on Internet of Things and Smart City Using Keyword Fequency and Centrality Analysis : Focusing on United States, Japan, South Korea)

  • 이택균
    • 디지털산업정보학회논문지
    • /
    • 제18권3호
    • /
    • pp.9-23
    • /
    • 2022
  • This study aims to examine research trends on the Internet of Things and smart city based on papers from the United States, Japan, and Korea. We collected 7113 papers related to the Internet of Things and smart city published from 2016 to 2021 in Elsevier's Scopus. Keyword frequency and centrality analysis were performed based on the abstracts of the collected papers. We found keywords with high frequency of appearance by calculating keyword frequency and identified central research keywords through the centrality analysis by country. As a result of the analysis, research on security, machine learning, and edge computing related to the Internet of Things and smart city were the most central and highly mediating research conducted in each country. As an implication, studies related to deep learning, cybersecurity, and edge computing in Korea have lower degree centrality and betweenness centrality compared to the United States and Japan. To solve the problem it is necessary to combine these studies with various fields. The future research direction is to analyze research trends on the Internet of Things and smart city in various regions such as Europe and China.

학습기반 효율적인 얼굴 검출 시스템 설계 (Design of an efficient learning-based face detection system)

  • 김현식;김완태;박병준
    • 디지털산업정보학회논문지
    • /
    • 제19권3호
    • /
    • pp.213-220
    • /
    • 2023
  • Face recognition is a very important process in video monitoring and is a type of biometric technology. It is mainly used for identification and security purposes, such as ID cards, licenses, and passports. The recognition process has many variables and is complex, so development has been slow. In this paper, we proposed a face recognition method using CNN, which has been re-examined due to the recent development of computers and algorithms, and compared with the feature comparison method, which is an existing face recognition algorithm, to verify performance. The proposed face search method is divided into a face region extraction step and a learning step. For learning, face images were standardized to 50×50 pixels, and learning was conducted while minimizing unnecessary nodes. In this paper, convolution and polling-based techniques, which are one of the deep learning technologies, were used for learning, and 1,000 face images were randomly selected from among 7,000 images of Caltech, and as a result of inspection, the final recognition rate was 98%.