• Title/Summary/Keyword: Leakage management

Search Result 662, Processing Time 0.027 seconds

Design and Estimation of a Session Key based Access Control Scheme for Secure Communications in IoT Environments (IoT 환경에서 안전한 통신을 위한 세션 키 기반 접근 제어 기법의 설계 및 평가)

  • Jin, Byungwook;Jung, Dongwoog;Cha, Siho;Jun, Moonseog
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.12 no.1
    • /
    • pp.35-41
    • /
    • 2016
  • Internet of Things (IoT) services are widely used in appliances of daily life and industries. IoT services also provide various conveniences to users and are expected to affect value added of all industries and national competitiveness. However, a variety of security threats are increased in IoT environments and lowers reliability of IoT devices and services that make some obstacles for commercialization. The attacks arising in IoT environments are making industrial and normal life accidents unlike existing information leak and monetary damages, and can expand damage scale of leakage of personal information and privacy more than existing them. To solve these problems, we design a session key based access control scheme for secure communications in IoT environments. The proposed scheme reinforces message security by generating session key between device and access control network system. We analyzed the stability of the proposed access scheme in terms of data forgery and corruption, unauthorized access, information disclosure, privacy violations, and denial of service attacks. And we also evaluated the proposed scheme in terms of permission settings, privacy indemnity, data confidentiality and integrity, authentication, and access control.

A Multichannel Authentication Technique In The Internet Banking System Using OTP (OTP를 이용한 인터넷뱅킹 시스템의 다중 채널 인증 기법)

  • Yoon, Seong Gu;Park, Jae Pyo
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.6 no.4
    • /
    • pp.131-142
    • /
    • 2010
  • Due to the development of the Internet, Internet banking that we are liberated from time and space has evolved into banking system. So modern life became comfortable. However, Dysfunction (malicious Information leakage and hacking etc.) of the Internet development has become a serious social problem. According to this, The need for security is rapidly growing. In this paper, we proposed the Internet Banking Authentication System using a dual-channel in OTP(One Time Password) authentication. This technology is that A user transfer transaction information to Bank through one Internet channel then bank transfer transaction information to user using the registered mobile phone or smart phone. If user confirm transaction information then bank request user's OTP value. User create OTP value and transfer to bank and bank authenticate them throgth the ARS. If authentication is pass then transaction permitted. Security assessment that the proposed system, the security requirement that the confidentiality and integrity, authentication, repudiation of all of the features provide a key length is longer than the current Internet banking systems, such as using encryption, the security provided by the Financial Supervisory Service Level 1 rating can be applied to more than confirmed.

An Empirical Study on the Influence Factors of the Mobile Cloud Storage Service Satisfaction (모바일 클라우드 스토리지 서비스 이용만족에 영향을 미치는 요인에 관한 실증연구)

  • Choi, Kwangdoo;Cho, Insu;Park, Heejun;Lee, Kiwon;Kang, Junmo
    • Journal of Korean Society for Quality Management
    • /
    • v.41 no.3
    • /
    • pp.381-394
    • /
    • 2013
  • Purpose: Nowadays, Mobile Cloud Storage services are used widely. For sustainable use of this service, we need to determine what factors affect satisfaction. Therefore, the purpose of this study is to identify the factors that influence satisfaction. Methods: To analyze factors that influence satisfaction, this study sets the factors into three dimensions such as service quality, perceived risk, and individual characteristics and analyze the causal relationship between influence factors and satisfaction through Structural Equation Model. Results: The results of this study are as follows; among service quality, user interface and reliability influenced satisfaction, but adaptability did not have any influence. Perceived risk of illegal access had a negative influence on satisfaction, while perceived risk of privacy leakage did not have significant influence on satisfaction in perceived risk. At last, self-efficacy had a significant influence on satisfaction. Conclusion: We identified the influence factors that influence satisfaction. Our findings will be necessary for Mobile Cloud Storage service providers to strengthen their service.

A successful conservative management of traumatic thoracic esophageal rupture (흉부둔상에 의한 식도파열의 성공적인 보존적 치료)

  • 노태훈
    • Journal of Chest Surgery
    • /
    • v.21 no.1
    • /
    • pp.169-174
    • /
    • 1988
  • Thoracic esophageal rupture caused by blunt trauma is often not recognized until late because of the vague symptoms in the initial state as well as its rare incidence, which can easily lead to fulminant mediastinitis with frequent fatal outcome. Once extensive mediastinitis occurs, the primary surgical repair of the esophageal tear is considered to be practically impossible. Various methods have been proposed for the management of these desperately ill patients, but no one provides an acceptable good result yet. The purpose of this article is to report the successful result obtained in the treatment of a patient with fulminant mediastinitis from traumatic esophageal rupture by continuous transesophageal irrigation. A 27 year-old male patient was brought to the emergency room of our hospital complaining of dyspnea and chest pain after blunt trauma. The diagnosis of esophageal rupture in the thorax was made late, about 46 hours after the initial injury, when mediastinitis had already progressed. The transesophageal irrigation method was immediately instituted which consisted of profuse transesophageal irrigation of the mediastinum with orally ingested fluid and/or by Levin tube, positioned proximal to the site of the rupture, and drainage of the irrigation fluid by thoracoscopically accurately positioned chest tubes connected to a well suctioning system. With subsiding inflammatory signs and symptoms, the esophagogram, obtained 54 days after the treatment, showed no evidence of the mediastinal leakage of contrast material which contrasted previous esophagograms with definitive dye collections in the mediastinum. Additional endoscopic finding confirmed complete healing of the esophageal mucosa, previously ruptured. He has been followed up without any problem until recently, 6 months after discharge.

  • PDF

A Study on Optimization of The Concentration of Cutting Oil to be used for Cutting (절삭가공(切削加工)에 사용(使用)되는 절삭유(切削油)의 농도최적화(濃度最適化)에 관(關)한 연구(硏究))

  • Kim, Gue-Tae;Kim, Won-Il
    • Journal of the Korean Society of Industry Convergence
    • /
    • v.16 no.3
    • /
    • pp.95-102
    • /
    • 2013
  • It is indispensable to modern society metal processing since the industrialized rapidly, but it is a metalworking cutting fluid immediately. In addition, this means selecting a emulsion on the basis of quality criteria processing method, the material of the material, cutting depth, cutting speed, Djourou fence Liang, and surface roughness, cutting oil, the shape of the device based on the emulsion, I will be the structure of the tank, filtration equipment also changes. In particular, acting bacteria is now breeding in response to the passage of time due to metal ion degradation due to heat generated hydraulic fluid leakage, humidity tung, during processing, seep from processing material at the time of processing the water-soluble cutting oil for generating the malodor by dropping significantly the performance of the cutting oil to corruption from, sometimes by introducing various additives to suppress spoilage in advance. In this study, we expect the effect of the cost reduction in the extension of fluid replacement cycle through the application of the management apparatus and deep understanding in the management of cutting fluid, the working environment through the understanding and interest of workers in the production site more than anything I try to become useful for the improvement.

Cost Risk Analysis for Preparing Budgets of Information Security using Fuzzy AHP (정보보안 예산 수립에서 퍼지 AHP의 적용을 통한 위험 비용 분석)

  • Ryu, Si-Wook;Her, Duk-Gyu
    • Journal of the Korea Safety Management & Science
    • /
    • v.14 no.3
    • /
    • pp.119-126
    • /
    • 2012
  • Recently, the breakdown of online banking servers and the leakage of customer information give rise to much concern about the security of information systems in financial and banking companies in Korea. The enforcement of security for information system becomes much more important issue than earlier. However, the security reinforcement of information system is restricted by a budget. In addition, the activities' cost to secure information system from threatening are under uncertain circumstances and should be established by a human decision maker who is basically uncertain and vague. Thus, making the budget for information system is exposed to any extent of the risk for these reasons. First, we introduce brief fuzzy set theory and fuzzy AHP (Analytic Hierarchy Process) methodology. Then, the cost elements that comprise yearly budget are presented and the priorities among the cost elements are calculated by fuzzy AHP. The cost elements that are exposed to risk are evaluated from the both perspectives of the risk impact and risk occurrence possibility which are expressed as linguistic terms. To get information on the risk profiles-pessimistic, most likely, and optimistic-for each cost element, the evaluation is accomplished and the result is presented. At last, the budget ranges-minimum, mode, maximum-for each cost element are estimated with the consideration of the risk profiles.

Industry safety characteristic of Prismatic EDLCs (각형 전기이중층 커패시터의 산업 안전성)

  • 김경민;장인영;강안수
    • Proceedings of the Safety Management and Science Conference
    • /
    • 2004.05a
    • /
    • pp.247-257
    • /
    • 2004
  • Electrodes were fabricated based on activated carbon powder BP-20, conducting agent such as Super P, vapor grown carbon fiber (VGCF) and acetylene black (AB), and the mixed binders of flexible poly(vinylidenefluoridehexafluoropropylene) [P(VdF-co-HFP)] and cross linking dispersion agent of polyvinylpyrrolidone (PVP) to increase mechanical strength. According to impedance measurement of the electrode with the addition of conducting agent, we found that it was possible to charge rapidly by the fast steady-state current convergence due to low equivalent series resistance (AC-ESR, fast charge transfer rate at interface between electrode and electrolyte and low RC time constant. The self-discharge of unit cell showed that diffusion process was controlled by the ion concentration difference of initial electrolyte due to the characteristics of Electric Double Layer Capacitor (EDLC) charged by ion adsorption in the beginning, but this by current leakage through the double-layer at the electrode/electrolyte interface had a minor effect and voltages of curves were remained constant regardless of electrode material. We found that the 2.3V/230F grade EDLC would be applied to industrial safety usage such as uninterrupted power supply (UPS) because of the constant DC-ESR by IR drop regardless of discharge current.

  • PDF

A Study on the Improvement of Classification of Explosion Hazardous Area using Hypothetic Volume through Release Characteristic (누출특성을 통한 폭발위험장소 선정방법의 개선에 대한 연구)

  • Kim, Dae-Yeon;Chon, Young-Woo;Lee, Ik-Mo;Hwang, Yong-Woo
    • Journal of the Korea Safety Management & Science
    • /
    • v.19 no.2
    • /
    • pp.31-39
    • /
    • 2017
  • Classify of explosion hazardous areas must be made at the site where flammable materials are used. This reason is that it is necessary to manage ignition sources in of explosion hazardous areas in order to reduce the risk of explosion. If such an explosion hazard area is widened, it becomes difficult to increase the number of ignition sources to be managed. The method using the virtual volume currently used is much wider than the result using CFD(Computational Fluid Dynamics). Therefore, we tried to improve the current method to compare with the new method using leakage characteristics. The result is a realistic explosion hazard if the light gas is calibrated to the mass and the heavy gas is calibrated to the lower explosion limit. However, it is considered that the safety factors should be taken into account in the calculated correction formula because such a problem should be considered as a buffer for safety.

Security Monitoring System for Apartment House Building Using Paver Line Carrier (전력선 통신을 이용한 집단주택 안전관리 시스템)

  • Kim, In-Soo;Kim, Kwan-Ho;Kim, Yo-Hee
    • Proceedings of the KIEE Conference
    • /
    • 1993.07a
    • /
    • pp.476-478
    • /
    • 1993
  • Instead of installing new communication wiring to each house in the apartment house building. the power distribution network. which is already installed in the building. can be use as communication medium. In a safty management, by adoption of power line communication system, at remote we can monitor safty related sensors such as fire, gas leakage, burglar intrusion and emergency call which are located at each house. From this viewpoint, we developed security monitoring system for apartment house building using power lines. Security monitoring system consists of Power Line Communication-Sub Controller (PLC-SC). Power Line Communication-Main Controller (PLC-MC) and Management System (MS). Between a PLC-MC and a PLC-SC, the transmission rate is 1200 bps in power lines and modulation technique is frequency shirt keying (FSK). In between a PLC-MC and a MS, the transmission rate is 1200 bps in communication line (RS-485). As a result of this research. transmission loss is 0.1dB per meter of intrabuilding distribution network. Transmission can be reach in 250 meters. So it is enough to communicate for security monitoring system in apartment house building.

  • PDF

Design of Mutual Authentication and Grouping Protocol Based On Network Control Server Applicable to General Purpose (범용적으로 적용 가능한 네트워크제어서버 기반의 상호인증 및 그룹핑 프로토콜 설계)

  • Park, Jungoh
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.13 no.4
    • /
    • pp.13-23
    • /
    • 2017
  • In order to protect personal information and important information (confidential information, sales information, user information, etc.) in the internal network, companies and organizations apply encryption to the Server-To-Server or Server-To-Client communication section, And are experiencing difficulties due to the increasing number of known attacks and intelligent security attacks. In order to apply the existing S / W encryption technology, it is necessary to modify the application. In the financial sector, "Comprehensive Measures to Prevent the Recurrence of Personal Information Leakage in the Domestic Financial Sector" has been issued, and standard guidelines for financial computing security have been laid out, and it is required to expand the whole area of encryption to the internal network. In addition, even in environments such as U-Health and Smart Grid, which are based on the Internet of Things (IoT) environment, which is increasingly used, security requirements for each collection gateway and secure transmission of the transmitted and received data The requirements of the secure channel for the use of the standard are specified in the standard. Therefore, in this paper, we propose a secure encryption algorithm through mutual authentication and grouping for each node through H / W based Network Control Server (NCS) applicable to internal system and IoT environment provided by enterprises and organizations. We propose a protocol design that can set the channel.