• Title/Summary/Keyword: Legitimate Technology

Search Result 66, Processing Time 0.022 seconds

Towards Choosing Authentication and Encryption: Communication Security in Sensor Networks

  • Youn, Seongwook;Cho, Hyun-chong
    • Journal of Electrical Engineering and Technology
    • /
    • v.12 no.3
    • /
    • pp.1307-1313
    • /
    • 2017
  • Sensor networks are composed of provide low powered, inexpensive distributed devices which can be deployed over enormous physical spaces. Coordination between sensor devices is required to achieve a common communication. In low cost, low power and short-range wireless environment, sensor networks cope with significant resource constraints. Security is one of main issues in wireless sensor networks because of potential adversaries. Several security protocols and models have been implemented for communication on computing devices but deployment these models and protocols into the sensor networks is not easy because of the resource constraints mentioned. Memory intensive encryption algorithms as well as high volume of packet transmission cannot be applied to sensor devices due to its low computational speed and memory. Deployment of sensor networks without security mechanism makes sensor nodes vulnerable to potential attacks. Therefore, attackers compromise the network to accept malicious sensor nodes as legitimate nodes. This paper provides the different security models as a metric, which can then be used to make pertinent security decisions for securing wireless sensor network communication.

[Retracted]A Critical Assessment of the Implementation of Sources of Power: An Indian Context

  • Potluri, Rajasekhara Mouly;Challa, Siva Kumar;Challagundla, Srilakshmi
    • The Journal of Industrial Distribution & Business
    • /
    • v.5 no.1
    • /
    • pp.11-15
    • /
    • 2014
  • Purpose - The core objective of this study is to comprehend the diverse nature of implementation of sources of power in the Indian context. Research design, data, and methodology - After a meticulous review of the relevant literature on various types of power with a particular kind of managers'involvement, the article reviews the Indian managers' behavioral perception and attitudinal disposition while exercising power in their organization, along with a judicious blend of different kinds of power to drive the organization to the expected level. Results - As an input to a full-fledged research study, researchers had taken up this precise discussion and observation on how the managers' community in India exercises its power. Generally, Indian managers usually implement legitimate power besides reward and coercive power as per the situation, by extending copious benefits to different stakeholders. Based on the psychological and behavioral disposition, Indian managers exercised power in their respective organizations in a fruitful manner. Conclusions -This article has carefully covered the entire corporate sector regardless of magnitude, type, or ownership. It is quite beneficial to all the proactive researchers and academia along with the corporate world.

The Classic Security Application in M2M: the Authentication Scheme of Mobile Payment

  • Hu, Liang;Chi, Ling;Li, Hong-Tu;Yuan, Wei;Sun, Yuyu;Chu, Jian-Feng
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.6 no.1
    • /
    • pp.131-146
    • /
    • 2012
  • As one of the four basic technologies of IOT (Internet of Things), M2M technology whose advance could influence on the technology of Internet of Things has a rapid development. Mobile Payment is one of the most widespread applications in M2M. Due to applying wireless network in Mobile Payment, the security issues based on wireless network have to be solved. The technologies applied in solutions generally include two sorts, encryption mechanism and authentication mechanism, the focus in this paper is the authentication mechanism of Mobile Payment. In this paper, we consider that there are four vital things in the authentication mechanism of Mobile Payment: two-way authentication, re-authentication, roaming authentication and inside authentication. Two-way authentication is to make the mobile device and the center system trust each other, and two-way authentication is the foundation of the other three. Re-authentication is to re-establish the active communication after the mobile subscriber changes his point of attachment to the network. Inside authentication is to prevent the attacker from obtaining the privacy via attacking the mobile device if the attacker captures the mobile device. Roaming authentication is to prove the mobile subscriber's legitimate identity to the foreign agency when he roams into a foreign place, and roaming authentication can be regarded as the integration of the above three. After making a simulation of our proposed authentication mechanism and analyzing the existed schemes, we summarize that the authentication mechanism based on the mentioned above in this paper and the encryption mechanism establish the integrate security framework of Mobile Payment together. This makes the parties of Mobile Payment apply the services which Mobile Payment provides credibly.

SDN based Discrimination Mechanism for Control Command of Industrial Control System (SDN 기반 산업제어시스템 제어명령 판별 메커니즘)

  • Cho, Minjeong;Seok, Byoungjin;Kim, Yeog;Lee, Changhoon
    • Journal of Digital Contents Society
    • /
    • v.19 no.6
    • /
    • pp.1185-1195
    • /
    • 2018
  • Industrial Control System (ICS) is a system that carry out monitoring and controls of industrial control process and is applied in infrastructure such as water, power, and gas. Recently, cyber attacks such as Brutal Kangaroo, Emotional Simian, and Stuxnet 3.0 have been continuously increasing in ICS, and these security risks cause damage of human life and massive financial losses. Attacks on the control layer among the attack methods for ICS can malfunction devices of the field device layer by manipulating control commands. Therefore, in this paper, we propose a mechanism that apply the SDN between the control layer and the field device layer in the industrial control system and to determine whether the control command is legitimate or not and we show simulation results on a simply composed control system.

A Strong Authentication Scheme with User Privacy for Wireless Sensor Networks

  • Kumar, Pardeep;Gurtov, Andrei;Ylianttila, Mika;Lee, Sang-Gon;Lee, HoonJae
    • ETRI Journal
    • /
    • v.35 no.5
    • /
    • pp.889-899
    • /
    • 2013
  • Wireless sensor networks (WSNs) are used for many real-time applications. User authentication is an important security service for WSNs to ensure only legitimate users can access the sensor data within the network. In 2012, Yoo and others proposed a security-performance-balanced user authentication scheme for WSNs, which is an enhancement of existing schemes. In this paper, we show that Yoo and others' scheme has security flaws, and it is not efficient for real WSNs. In addition, this paper proposes a new strong authentication scheme with user privacy for WSNs. The proposed scheme not only achieves end-party mutual authentication (that is, between the user and the sensor node) but also establishes a dynamic session key. The proposed scheme preserves the security features of Yoo and others' scheme and other existing schemes and provides more practical security services. Additionally, the efficiency of the proposed scheme is more appropriate for real-world WSNs applications.

A New Fine-grain SMS Corpus and Its Corresponding Classifier Using Probabilistic Topic Model

  • Ma, Jialin;Zhang, Yongjun;Wang, Zhijian;Chen, Bolun
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.12 no.2
    • /
    • pp.604-625
    • /
    • 2018
  • Nowadays, SMS spam has been overflowing in many countries. In fact, the standards of filtering SMS spam are different from country to country. However, the current technologies and researches about SMS spam filtering all focus on dividing SMS message into two classes: legitimate and illegitimate. It does not conform to the actual situation and need. Furthermore, they are facing several difficulties, such as: (1) High quality and large-scale SMS spam corpus is very scarce, fine categorized SMS spam corpus is even none at all. This seriously handicaps the researchers' studies. (2) The limited length of SMS messages lead to lack of enough features. These factors seriously degrade the performance of the traditional classifiers (such as SVM, K-NN, and Bayes). In this paper, we present a new fine categorized SMS spam corpus which is unique and the largest one as far as we know. In addition, we propose a classifier, which is based on the probability topic model. The classifier can alleviate feature sparse problem in the task of SMS spam filtering. Moreover, we compare the approach with three typical classifiers on the new SMS spam corpus. The experimental results show that the proposed approach is more effective for the task of SMS spam filtering.

The Role of Dealers'Non-Mediated Power in Fostering SME Manufacturers' Cooperation: SME Manufacturers' Perspective

  • Chinomona, Richard
    • The Journal of Industrial Distribution & Business
    • /
    • v.3 no.2
    • /
    • pp.5-16
    • /
    • 2012
  • Purpose - Distribution channels cannot function without cooperation. While evidence suggests channel power plays a fundamental role in fostering successful manufacturer-dealer channel cooperation in Western countries distribution systems, little is known empirically as to how dealers' possession of non-mediated powers influence SME manufacturers' cooperation in Asian developing countries. Research design, data, methodology - Drawing upon the extant distribution channels literatures; this study conceptualizes a model and examines the effects of dealer's non-mediated powers on manufacturing SME firms, as well as the mediating influence of trust, relationship satisfaction and commitment. A survey of 400 manufacturing SMEs in Taiwan empirically supports the proposed hypothesis. Results - The model is acceptable in terms of overall goodness of fit. Acceptable model fit are indicated by χ2/(df): 2.35, GFI≧.90; RMSEA values≦ .08; IFI, TLI and CFI values≧.90. Our results indicate that, GFI (0.910), IFI (0.937), TLI (0.903), CFI (0.936), and RMSEA (0.079) and therefore, achieved the suggested thresholds. Conclusions - The results of this study have some managerial implications for managers in the dealer's firms. The overall implication from the findings is that managers can utilize expert, referent and traditional legitimate powers to attain channel cooperation with manufacturing SMEs in addition to garnering their trust, relationship satisfaction and commitment.

  • PDF

Micro Metal Powder Injection Molding in the W-Cu System (W-Cu의 마이크로 금속분말사출성형)

  • 김순욱;양주환;박순섭;김영도;문인형
    • Journal of Powder Materials
    • /
    • v.9 no.4
    • /
    • pp.267-272
    • /
    • 2002
  • The production of micro components is one of the leading technologies in the fields of information and communiation, medical and biotechnology, and micro sensor and micro actuator system. Microfabrication (micromachining) techniques such as X-ray lithography, electroforming, micromolding and excimer laser ablation are used for the production of micro components out of silicon, polymer and a limited number of pure metals or binary alloys. However, since the first development of microfabrication technologies there have been demands for the cost-effective replication in large scale series as well as the extended range of available material. One such promising process is micro powder injection molding (PIM), which inherits the advantages of the conventional PIM technology, such as low production cost, shape complexity, applicability to many materials, applicability to many materials, and good tolerance. This paper reports on a fundamental investigation of the application of W-Cu powder to micro metal injection molding (MIM), especially in view of achieving a good filling and a safe removal of a micro mold conducted in the experiment. It is absolutely legitimate and meaningful, at the present state of the technique, to continue developing the micro MIM towards production processes for micro components.

A Study of Program Execution Control based on Whitelist (화이트리스트 기반 프로그램 실행 통제 방안 연구)

  • Kim, Chang-hong;Choi, Dae-young;Yi, Jeong-hyun;Kim, Jong-bae
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2014.10a
    • /
    • pp.346-349
    • /
    • 2014
  • Currently, the growing cyber threat continues, the damage caused by the evolution of malicious code incidents become more bigger. Such advanced attacks as APT using 'zero-day vulnerability' bring easy way to steal sensitive data or personal information. However it has a lot of limitation that the traditional ways of defense like 'access control' with blocking of application ports or signature base detection mechanism. This study is suggesting a way of controlling application activities focusing on keeping integrity of applications, authorization to running programs and changes of files of operating system by hardening of legitimate resources and programs based on 'white-listing' technology which analysis applications' behavior and its usage.

  • PDF

The Features of Restricted Access to Information at European and East Asian Libraries

  • Makhotina, Natalya;Pshenichnaya, Evgeniya
    • Journal of Information Science Theory and Practice
    • /
    • v.9 no.3
    • /
    • pp.31-41
    • /
    • 2021
  • The growing number of threats to society through the uncontrolled distribution of information is forcing library communities in many countries to reconsider their views on free access to collections. Based on the content of numerous documents of international importance, it can be concluded that in any democratic country access to information is one of the most important human rights, along with the right to life, liberty, and security of person. However, the state has the right to restrict citizens' access to information within the framework of existing legislation. Constantly, restrictions on access to information are established in order to protect the ethical foundations of the constitutional order, morality, health, rights, and legitimate interests of others, to ensure the country's defense and state security. It goes without saying that each country has the right to independently decide where the boundaries lie between permitted and prohibited information, including printed information, contained in library collections. This article describes three levels of access restriction: foreign, state, and regional. The authors have analyzed the legal and regulatory documents that govern libraries, as well as the reasons and methods of limitation. A comparative analysis of the restriction of access to information in the countries of Europe and Asia is presented.