• Title/Summary/Keyword: Major information and communication infrastructure

Search Result 65, Processing Time 0.027 seconds

Comparative Analysis of a Competitive Technology for Major Future Energy Resources

  • Koo Young-Duk;Kim Eun-Sun;Park Young-Seo
    • Journal of information and communication convergence engineering
    • /
    • v.3 no.2
    • /
    • pp.101-104
    • /
    • 2005
  • Recently advanced countries are making every effort to promote the efficiency of electric power production and supply, to deal with the environmental problems, and to develop the new energy. In particular, they are driving forward to develop various technologies for electric power in mid-long term, that are technology for building infrastructure of power transportation, establishing service network for account management using electronic technologies, elevating economic productivity by innovative electronic technologies, control-ling the discharge of global warming gas, using clean efficient energy, and so forth. However, power technology of Korea lagged behind than technology of advanced countries. Also, resources for developing power technology are limited in our country. Therefore, it is necessary to improve the efficiency of R&D investment. For it, our country must compare and analyze with technologies of advanced countries which are taking competitive advantage in the main future energy. Through comparative analysis, limited R&D resources of our country must be concentrated on technologies that can secure competitive advantage from now on.

A Survey on Detecting Interactions among Different Devices/Apps in IoT (IoT 분야의 다양한 기기/앱 간 상호작용 검출에 관한 연구동향)

  • Yicheng Zhen;Yeonjoon Lee
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2023.05a
    • /
    • pp.101-103
    • /
    • 2023
  • With the recent advances in communication technology and Internet of Things (IoT) infrastructure, home automation systems have emerged as a new paradigm for providing users with convenient smart home services. The IoT ecosystem has merged digital systems with the physical world, dramatically changing the way people live and work. However, at the same time, security remains one of the most significant research issues in IoT, as the deployment and application of high-availability systems come with various security risks that cause serious threats to users. Among them, the security issues arising from the interaction among devices/applications should not be underestimated. Attackers can exploit interactions among devices/applications to hack into the user's home. In this paper, we present a survey of research on detecting various types of interactions among devices/applications in IoT.

Design of Communication Protocol for Developing WISDOM(Wireless Interface Signal Control System for Dynamic and Optimal Management) (WISDOM(차세대 신호제어시스템) 개발을 위한 통신 프로토콜 설계)

  • Jung, Sung-Dae;Lee, Sang-Sun;Yoon, Young-Bum;Kim, Jong-Bok;Moon, Young-Jun
    • The Journal of The Korea Institute of Intelligent Transport Systems
    • /
    • v.7 no.1
    • /
    • pp.92-100
    • /
    • 2008
  • The existing transportation systems is emerged as a major obstacle to solve the problems such as a traffic jam and the increasing cost for a distribution and a traffic safety. In hun, ITS targeting intellectual vehicles and transportation infrastructure like road and signals is getting more important and the standards of ITS wireless communication is also getting attention. New traffic control strategies are being developed to utilize real-time traffic information collected by detection method using ITS wireless technology. Especially, DSRC system is being expanded wit ETCS and the use of OBU is spreading. These infrastructures will have much influence on ITS industry and a profound study on the method of utilizing a present infrastructure is going on in various fields. The optimum traffic signal control system using quality real-time information through these infrastructure is under development and so is WISDOM. Accordingly, this paper proposes communication protocol utilizing DSRC to collect real-time traffic information in WISDOM.

  • PDF

A Secure Agent Communication Mechanism for Intruder Tracing System (침입자 추적 시스템의 에이전트 통신 보안을 위한 메커니즘)

  • 최진우;황선태;우종우;정주영;최대식
    • Journal of KIISE:Information Networking
    • /
    • v.29 no.6
    • /
    • pp.654-662
    • /
    • 2002
  • As the Internet technology becomes a major information infrastructure, an emerging problem is the tremendous increase of malicious computer intrusions. The present Intrusion Detection System (IDS) serves a useful purpose for detecting such intrusions, but the current situation requires more active response mechanism other than simple detection. This paper describes a multi-agent based tracing system against the intruders when the system is attacked. The focus of the study lies on the secure communication mechanism for the agent message communication. We have extended parameters on the KQML protocol, and apt)lied the public key encryption approach, The limitation might be the requirements of two-way authentication for every communication through the broker agent. This model ma)r not improve the efficiency, but it provides a concrete secure communication. Also this is one important factor to protect the agent and the tracing server during the tracing process.

Design of Comprehensive Security Vulnerability Analysis System through Efficient Inspection Method according to Necessity of Upgrading System Vulnerability (시스템 취약점 개선의 필요성에 따른 효율적인 점검 방법을 통한 종합 보안 취약성 분석 시스템 설계)

  • Min, So-Yeon;Jung, Chan-Suk;Lee, Kwang-Hyong;Cho, Eun-Sook;Yoon, Tae-Bok;You, Seung-Ho
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.18 no.7
    • /
    • pp.1-8
    • /
    • 2017
  • As the IT environment becomes more sophisticated, various threats and their associated serious risks are increasing. Threats such as DDoS attacks, malware, worms, and APT attacks can be a very serious risk to enterprises and must be efficiently managed in a timely manner. Therefore, the government has designated the important system as the main information communication infrastructure in consideration of the impact on the national security and the economic society according to the 'Information and Communication Infrastructure Protection Act', which, in particular, protects the main information communication infrastructure from cyber infringement. In addition, it conducts management supervision such as analysis and evaluation of vulnerability, establishment of protection measures, implementation of protection measures, and distribution of technology guides. Even now, security consulting is proceeding on the basis of 'Guidance for Evaluation of Technical Vulnerability Analysis of Major IT Infrastructure Facilities'. There are neglected inspection items in the applied items, and the vulnerability of APT attack, malicious code, and risk are present issues that are neglected. In order to eliminate the actual security risk, the security manager has arranged the inspection and ordered the special company. In other words, it is difficult to check against current hacking or vulnerability through current system vulnerability checking method. In this paper, we propose an efficient method for extracting diagnostic data regarding the necessity of upgrading system vulnerability check, a check item that does not reflect recent trends, a technical check case for latest intrusion technique, a related study on security threats and requirements. Based on this, we investigate the security vulnerability management system and vulnerability list of domestic and foreign countries, propose effective security vulnerability management system, and propose further study to improve overseas vulnerability diagnosis items so that they can be related to domestic vulnerability items.

Applying Workload Shaping Toward Green Cloud Computing

  • Kim, Woongsup
    • International journal of advanced smart convergence
    • /
    • v.1 no.2
    • /
    • pp.12-15
    • /
    • 2012
  • Energy costs for operating and cooling computing resources in Cloud infrastructure have increased significantly up to the point where they would surpass the hardware purchasing costs. Thus, reducing the energy consumption can save a significant amount of management cost. One of major approach is removing hardware over-provisioning. In this paper, we propose a technique that facilitates power saving through reducing resource over provisioning based on virtualization technology. To this end, we use dynamic workload shaping to reschedule and redistribute job requests considering overall power consumption. In this paper, we present our approach to shape workloads dynamically and distribute them on virtual machines and physical machines through virtualization technology. We generated synthetic workload data and evaluated it in simulating and real implementation. Our simulated results demonstrate our approach outperforms to when not using no workload shaping methodology.

Design and Development of a Web Based Digital Repository for Scholarly Communication: A Case of NM-AIST Tanzania

  • Mgonzo, Wasiwasi J.;Yonah, Zaipuna O.
    • International Journal of Knowledge Content Development & Technology
    • /
    • v.4 no.2
    • /
    • pp.97-108
    • /
    • 2014
  • Institutional repositories are essential research infrastructures for research-based universities. A properly dimensioned institutional repository has the potential to increase research impact and enhance the visibility of an institution through its scholarly outputs. The aim of the study reported in this paper was to design and develop a web-based digital repository for scholarly communications using NM-AIST as a case study. The system was developed using open source software. Findings obtained from system validation tests show that the system is a viable solution to the major challenges encountered in the management and sharing of scholarly information at the institution.

A Study on the Determinants of Imbalanced Regional Development : An Application of Regression Model for a Bias due to Heterogeneity across Region (지역 불균형 발전의 결정요인 : 지역간 이질성 편의를 고려한 희귀모형의 적용)

  • 박범조;고석찬
    • Journal of the Korean Regional Science Association
    • /
    • v.14 no.2
    • /
    • pp.35-50
    • /
    • 1998
  • This paper examines the determinants of imbalanced regional development in Korea during the period of 1985-1995. The review of previous analytical techniques have been used to analyze the determinants of disparities in regional development of disparities in regional development, but few has applied the regression technique which reduces a bias due to heterogeneity across region. The results of the study show that Kmenta model with per capita GRDP as dependent variable can reduce the heterogeneity bias in regional development and can minimize the statical errors in estimation and interpretation of the coefficients of the explanatory variables. According to the results of Kmenta model, urban infrastructure such as roads, information and communication facilities are major causes of regional disparity over the period of 1985-1995. The results of the study also indicate that local government should devote their policy efforts to identify and utilize the unique soci-economic characteristics of each locality in the process of regional development.

  • PDF

Secure and Efficient Key Management Scheme for Wireless Mesh Network (무선 메쉬망에서의 안전하고 효율적인 키관리 스킴)

  • Salam, Md. Iftekhar;Singh, Madhusudan;Lee, Sang-Gon;Lee, Hoon-Jae
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2011.04a
    • /
    • pp.844-847
    • /
    • 2011
  • Wireless mesh network (WMN) is a type of mobile ad-hoc network consists of wireless router, mobile clients and gateway which connects the network with the Internet. To provide security in the network it is required to encrypt the message sent among the communicating nodes in such way so that only legitimate user can retrieve the original data. Several security mechanisms have been proposed so far to enhance the security of WMN. However, there still exists a need for a comprehensive mechanism to prevent attacks in data communication. Considering the characteristic of mesh network, in this paper we proposed a public key cryptography based security architecture to establish a secure key agreement among communicating nodes in mesh network. The proposed security architecture consists of two major sections: client data protection and network data protection. Client data protection deals with the mutual authentication between the client and the access router and provide client to access router encryption for data confidentiality using standard IEEE 802.11i protocol. On the other hand, network data protection ensures encrypted routing and data transfer in the multi hop backbone network. For the network data protection, we used the pre-distributed public key to form a secure backbone infrastructure.

A Study on Risk Assessments and Protection Improvement for Electric Power Infrastructures against High-altitude Electromagnetic Pulse (전력기반시설의 고 고도 핵 전자기파에 대한 위험성 검토 및 방호 개선방안 연구)

  • Chung, Yeon-Choon
    • Convergence Security Journal
    • /
    • v.19 no.3
    • /
    • pp.43-50
    • /
    • 2019
  • In a hyper-connected society, electric power infrastructures and information and communication infrastructures are the core of critical national infrastructures. However, electric power infrastructure is very deadly to high-frequency nuclear electromagnetic pulse (HEMP) threats recently issued by North Korea, so the resilience through rapid recovery after attack is directly related to the survivability of our country. Therefore, electric power infrastructure should take precedence over any other key infrastructure, with preemptive protection measures and fast recovery plans. In this paper, the characteristics of the HEMP threats was examined, and the risks and effective major protection measures of the electric power infrastructures are discussed. In the future, it is expected that it will be able to help establish the direction of enactment and revision of legal schems related to the 'high power EMP infringement prevention' for Korea's electric power infrastructures.