• Title/Summary/Keyword: Leakage verification

Search Result 126, Processing Time 0.052 seconds

Secure Storage and Management of Vaccination Records Allowing Restrictive Access upon Users' Consent (사용자 동의로 제한적 접근을 허용하는 백신 접종 기록의 안전한 보관 및 관리)

  • Park, Jun-Cheol
    • Smart Media Journal
    • /
    • v.10 no.2
    • /
    • pp.100-109
    • /
    • 2021
  • As the COVID-19 vaccination begins, it is necessary to safely store and manage the vaccination history for vaccinated people, as well as provide only the minimal information for the requested purpose, not in the form of all or nothing, to the institution requesting vaccination personal information. This paper proposes a scheme to safely store and manage the people's vaccination records in a non-forgeable blockchain, and to ensure that users provide only the minimal information necessary to the verifier from their vaccination personal information. A user authorizes the verifier to access the information he has consented with by entering the fingerprint on his smartphone, and in this process, no personal information or secrets can be exposed to an attacker. In addition, it is guaranteed that it is neither possible to impersonate the user nor to steal user personal information even in the case of theft or loss of the smartphone, or leakage of information from the vaccination history management institution. Using the scheme, users have no fear on external exposure of personal information and follow-up damage due to excessive information provision by giving out only the minimal information suited to the verifier.

Power Analysis Attacks on the Stream Cipher Rabbit (스트림 암호 Rabbit에 대한 전력분석 공격)

  • Bae, Ki-Seok;Ahn, Man-Ki;Park, Jea-Hoon;Lee, Hoon-Jae;Moon, Sang-Jae
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.21 no.3
    • /
    • pp.27-35
    • /
    • 2011
  • Design of Sensor nodes in Wireless Sensor Network(WSN) should be considered some properties as electricity consumption, transmission speed, range, etc., and also be needed the protection against various attacks (e.g., eavesdropping, hacking, leakage of customer's secret data, and denial of services). The stream cipher Rabbit, selected for the final eSTREAM portfolio organized by EU ECRYPT and selected as algorithm in part of ISO/IEC 18033-4 Stream Ciphers on ISO Security Standardization recently, is a high speed stream cipher suitable for WSN. Since the stream cipher Rabbit was evaluated the complexity of side-channel analysis attack as 'Medium' in a theoretical approach, thus the method of power analysis attack to the stream cipher Rabbit and the verification of our method by practical experiments were described in this paper. We implemented the stream cipher Rabbit without countermeasures of power analysis attack on IEEE 802.15.4/ZigBee board with 8-bit RISC AVR microprocessor ATmega128L chip, and performed the experiments of power analysis based on difference of means and template using a Hamming weight model.

A Proposal of Cybersecurity Technical Response Job Competency Framework and its Applicable Model Implementation (사이버보안 기술적 대응 직무 역량 프레임워크 제안 및 적용 모델 구현 사례)

  • Hong, Soonjwa;Park, Hanjin;Choi, Younghan;Kang, Jungmin
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.30 no.6
    • /
    • pp.1167-1187
    • /
    • 2020
  • We are facing the situation where cyber threats such as hacking, malware, data leakage, and theft, become an important issue in the perspective of personal daily life, business, and national security. Although various efforts are being made to response to the cyber threats in the national and industrial sectors, the problems such as the industry-academia skill-gap, shortage of cybersecurity professionals are still serious. Thus, in order to overcome the skill-gap and shortage problems, we propose a Cybersecurity technical response Job Competency(CtrJC) framework by adopting the concept of cybersecurity personnel's job competency. As a sample use-case study, we implement the CtrJC against to personals who are charged in realtime cybersecurity response, which is an important job at the national and organization level, and verify the our framework's effects. We implement a sample model, which is a CtrJC against to realtime cyber threats (We call it as CtrJC-R), and study the verification and validation of the implemented model.

A Study on the Improvement of Safety of Measuring Instrument Structure and Performance by Expansion of Gas AMI (가스 AMI 보급 확대에 따른 계량기 구조 및 성능 안전성 향상 방안 연구)

  • Lee, Hyoung-Min;Kim, Min-Gi;Choi, Eun-Il
    • Journal of the Korean Institute of Gas
    • /
    • v.26 no.5
    • /
    • pp.10-15
    • /
    • 2022
  • Currently, some urban gas companies are conducting their own gas AMI meter verification projects, along with the demonstration of gas AMI (Advanced Metering Infrastructure) meters under the supervision of the government. There are many positive factors such as remote meter reading and ensuring user gas safety through AMI meter installation, but on the other hand, there are also many problems such as battery discharge, expensive price, and decreased reliability of remote meter data. This study sought various improvements in gas AMI meters along with prevention of serious civil disasters by preemptively eliminating structural safety problems and potential risks from gas leakage due to the expansion of gas AMI meters, and it is expected that this study will contribute to the government's policy to advance gas AMI.

Comparison of key management systems across different industries (다양한 산업에서의 키 관리 시스템 비교 분석)

  • Woojoo Kwon;Hangbae Chang
    • Journal of Platform Technology
    • /
    • v.12 no.3
    • /
    • pp.55-61
    • /
    • 2024
  • As the digital environment becomes more complex and cyber attacks become more sophisticated, the importance of data protection is emerging. As various security threats such as data leakage, system intrusion, and authentication bypass increase, secure key management is emerging. Key Management System (KMS) manages the entire encryption key life cycle procedure and is used in various industries. There is a need for a key management system that considers requirements suitable for the environment of various industries including public and finance. The purpose of this paper is to derive the characteristics of the key management system for each industry by comparing and analyzing key management systems used in representative industries. As for the research method, information was collected through literature and technical document analysis and case analysis, and comparative analysis was conducted by industry sector. The results of this paper will be able to provide a practical guide when introducing or developing a key management system suitable for the industrial environment. The limitations are that the analyzed industrial field was insufficient and experimental verification was insufficient. Therefore, in future studies, we intend to conduct specific performance tests through experiments, including key management systems in various fields.

  • PDF

Applicability of TDR Sensor for Monitoring Moisture Content of Landfill - Focusing on the 2nd Landfill of SUDOKWON Landfill Site - (매립지 함수율 모니터링을 위한 TDR 센서의 적용성 검토 - 수도권매립지 제2매립장을 중심으로 -)

  • Won-Young Choi;Young-Kyu Kim;Chul Hee Lee;Yong Jae Lee;Seung-Kyu Chun
    • Journal of Soil and Groundwater Environment
    • /
    • v.29 no.4
    • /
    • pp.1-11
    • /
    • 2024
  • This study evaluated a method for prompt and periodic monitoring of moisture content in the waste layer of a landfill using a Time Domain Reflectometry (TDR) sensor, aimed at ensuring the stable operation of the bioreactor facility at the 2nd landfill of the SUDOKWON Landfill Site. It was found that the TDR sensor is sensitive to variables such as temperature changes and ion content in both the waste layer and leachate, indicating that a correction equation is necessary. A correction equation derived through regression analysis demonstrated a high correlation (correlation coefficient = 0.9647), and field verification experiments confirmed its reliability with an average deviation of only 1.5%. This verifies that the TDR sensor is effective for measuring and monitoring moisture content in landfills. It is also anticipated to be useful for various applications, including monitoring leachate levels, detecting leachate leakage, and assessing rainwater infiltration.

A standardized procedure on building spectral library for hazardous chemicals mixed in river flow using hyperspectral image (초분광 영상을 활용한 하천수 혼합 유해화학물질 표준 분광라이브러리 구축 방안)

  • Gwon, Yeonghwa;Kim, Dongsu;You, Hojun
    • Journal of Korea Water Resources Association
    • /
    • v.53 no.10
    • /
    • pp.845-859
    • /
    • 2020
  • Climate change and recent heat waves have drawn public attention toward other environmental issues, such as water pollution in the form of algal blooms, chemical leaks, and oil spills. Water pollution by the leakage of chemicals may severely affect human health as well as contaminate the air, water, and soil and cause discoloration or death of crops that come in contact with these chemicals. Chemicals that may spill into water streams are often colorless and water-soluble, which makes it difficult to determine whether the water is polluted using the naked eye. When a chemical spill occurs, it is usually detected through a simple contact detection device by installing sensors at locations where leakage is likely to occur. The drawback with the approach using contact detection sensors is that it relies heavily on the skill of field workers. Moreover, these sensors are installed at a limited number of locations, so spill detection is not possible in areas where they are not installed. Recently hyperspectral images have been used to identify land cover and vegetation and to determine water quality by analyzing the inherent spectral characteristics of these materials. While hyperspectral sensors can potentially be used to detect chemical substances, there is currently a lack of research on the detection of chemicals in water streams using hyperspectral sensors. Therefore, this study utilized remote sensing techniques and the latest sensor technology to overcome the limitations of contact detection technology in detecting the leakage of hazardous chemical into aquatic systems. In this study, we aimed to determine whether 18 types of hazardous chemicals could be individually classified using hyperspectral image. To this end, we obtained hyperspectral images of each chemical to establish a spectral library. We expect that future studies will expand the spectral library database for hazardous chemicals and that verification of its application in water streams will be conducted so that it can be applied to real-time monitoring to facilitate rapid detection and response when a chemical spill has occurred.

Dispersal of Hazardous Substance in a City Environment Based on Weather Conditions and Its Risk Assessment at the Pedestrian Level (기상조건에 따른 도시내 위험물질 확산정보와 보행자환경 위험영향평가)

  • Kim, Eun-Ryoung;Lee, Gwang-Jin;Yi, Chaeyeon
    • Journal of Environmental Impact Assessment
    • /
    • v.26 no.4
    • /
    • pp.242-256
    • /
    • 2017
  • In this paper, dispersion scenarios concerning various meteorological conditions and real urban structures were made to estimate the impacts of hazardous substance leakage accidents and to reduce damages. Based on the scenario of the hazardous substance dispersion, the characteristics of the risk in the pedestrian environment were analyzed in Gangnam, Seoul. The scenarios are composed of 48 cases according to the meteorological conditions of wind direction and wind speed. In order to analyze the dispersion characteristics of the hazardous substances, simulations were conducted using a computational fluid dynamic (CFD) model with hydrogen fluoride releases. The validation for the simulated wind was conducted at a specific period, and all the calculated verification indices were within the valid range. As a result of simulated dispersion field at pedestrian level, it was found that the dispersion pattern was influenced by the flow, which was affected by the artificial obstacles. Also, in the case of the weakest wind speed of the inflow, the dispersion of the hazardous substance appeared in the direction of the windward side at the pedestrian level due to the reverse flow occurred at lower layers. Through this study, it can be seen that the artificial structures forming the city have a major impact on the flow formed in urban areas. The proposed approach can be used to simulate the dispersion of the hazardous substances and to assess the risk to pedestrians in the industrial complexes dealing with actual hazardous substances in the future.

Consideration of Carbon dioxide Capture and Geological Storage (CCS) as Clean Development Mechanism (CDM) Project Activities: Key Issues Related with Geological Storage and Response Strategies (이산화탄소 포집 및 지중저장(CCS) 기술의 청정개발체제(CDM)로의 수용 여부에 대한 정책적 고찰: 지중저장과 관련된 이슈 및 대응방안)

  • Huh, Cheol;Kang, Seong-Gil;Ju, Hyun-Hee
    • Journal of the Korean Society for Marine Environment & Energy
    • /
    • v.14 no.1
    • /
    • pp.51-64
    • /
    • 2011
  • Carbon dioxide Capture and Storage (CCS) is one of the key players in greenhouse gas (GHG) reduction portfolio for mitigating climate change. CCS makes simultaneously it possible not only to reduce a huge amount of carbon dioxide directly from the emission sources (e.g., coal power plant) but also to maintain the carbon concentrated-energy and/or industry infrastructure. Internationally, the United Nations Framework Convention on Climate Change (UNFCCC) is dealing the agenda for considering the possibility of including CCS project as one of Clean Development Mechanism (CDM) projects. Despite its usefulness, however, there are the controversies in including CCS as the CDM project, whose issues include i) non-permanence, including long-term permanence, ii) measuring, reporting and verification (MRV), iii) environmental impacts, iv) project activity boundaries, v) international law, vi) liability, vii) the potential for perverse outcomes, viii) safety, and ix) insurance coverage and compensation for damages caused due to seepage or leakage. In this paper, those issues in considering CCS as CDM are summarized and analyzed in order to suggest some considerations to policy makers in realizing the CCS project in Korea in the future.

Verifying a Safe P2P Security Protocol in M2M Communication Environment (M2M 통신환경에서 안전한 P2P 보안 프로토콜 검증)

  • Han, Kun-Hee;Bae, Woo-Sik
    • Journal of Digital Convergence
    • /
    • v.13 no.5
    • /
    • pp.213-218
    • /
    • 2015
  • In parallel with evolving information communication technology, M2M(Machine-to-Machine) industry has implemented multi-functional and high-performance systems, and made great strides with IoT(Internet of Things) and IoE(Internet of Everything). Authentication, confidentiality, anonymity, non-repudiation, data reliability, connectionless and traceability are prerequisites for communication security. Yet, the wireless transmission section in M2M communication is exposed to intruders' attacks. Any security issues attributable to M2M wireless communication protocols may lead to serious concerns including system faults, information leakage and privacy challenges. Therefore, mutual authentication and security are key components of protocol design. Recently, secure communication protocols have been regarded as highly important and explored as such. The present paper draws on hash function, random numbers, secret keys and session keys to design a secure communication protocol. Also, this paper tests the proposed protocol with a formal verification tool, Casper/FDR, to demonstrate its security against a range of intruders' attacks. In brief, the proposed protocol meets the security requirements, addressing the challenges without any problems.