• Title/Summary/Keyword: Network Security System

Search Result 2,712, Processing Time 0.026 seconds

Design of Fire Evacuation Guidance System using USN Mesh Routing in High-Rise Buildings (초고층 건물 화재에서 USN 메쉬 라우팅을 이용한 피난유도 시스템 설계)

  • Choi, Yeon-Yi;Joe, In-Whee
    • Fire Science and Engineering
    • /
    • v.22 no.3
    • /
    • pp.278-286
    • /
    • 2008
  • When big fire in high rise building and multiplex happens, the needs for high prevention system of disaster are being increased for getting the real-time scene state, quick lifesaver, and safe life security. In this paper the proposed evacuation guidance algorithm which analyzed the feature and danger of fire in high rise buildings, gave simplicity and scalability. Our research shows as fire and disaster occur in high rise buildings we construct sensor networks and sense realtime location information on fire alive people, and the situation information for fire instructed quick and safe escaping route by using mesh routing algorithm scheme relative to exit sign.

The Case Study for Path Selection Verification of IGP Routing Protocol (IGP 라우팅 프로토콜의 경로선택 검증을 위한 구현 사례)

  • Kim, No-Whan
    • Journal of the Korea Society of Computer and Information
    • /
    • v.19 no.9
    • /
    • pp.197-204
    • /
    • 2014
  • RIP, EIGRP, OSPF are the interior gateway protocol for sending and receiving routing information among routers in AS(Autonomous System). Various path selection methods using the metric in regard to them have been studied recently but there are few examples that the contents learners understand theoretically are verified by the practice. The Best Path is determined by calculating the Cost value based on the relevant topology of each routing protocol. After implementing the virtual network, it is certain that the results tracking and verifying the relevant path selection of each routing protocol are consistent with the Best Path. If methods suggested in this paper are applied properly, the relevant path selection process of routing protocol can be understood systematically. And it is expected that the outstanding results of learning will be able to be achieved.

A Link Between Integrals and Higher-Order Integrals of SPN Ciphers

  • Li, Ruilin;Sun, Bing;Li, Chao
    • ETRI Journal
    • /
    • v.35 no.1
    • /
    • pp.131-141
    • /
    • 2013
  • Integral cryptanalysis, which is based on the existence of (higher-order) integral distinguishers, is a powerful cryptographic method that can be used to evaluate the security of modern block ciphers. In this paper, we focus on substitution-permutation network (SPN) ciphers and propose a criterion to characterize how an r-round integral distinguisher can be extended to an (r+1)-round higher-order integral distinguisher. This criterion, which builds a link between integrals and higher-order integrals of SPN ciphers, is in fact based on the theory of direct decomposition of a linear space defined by the linear mapping of the cipher. It can be directly utilized to unify the procedure for finding 4-round higher-order integral distinguishers of AES and ARIA and can be further extended to analyze higher-order integral distinguishers of various block cipher structures. We hope that the criterion presented in this paper will benefit the cryptanalysts and may thus lead to better cryptanalytic results.

ECC-based IPTV Service Key Establishment Protocol With User Attribute (사용자 속성을 이용한 ECC 기반의 IPTV 서비스 키 설립 프로토콜)

  • Jeong, Yoon-Su;Shin, Seung-Soo
    • Journal of Digital Convergence
    • /
    • v.10 no.3
    • /
    • pp.105-111
    • /
    • 2012
  • Internet Protocol Television (IPTV) through broadband cable network is a subscriber-based system which consists of software and set-top box. However, a weakness for the current IPTV system is the lack of security between users and CAS. This paper proposes a user authentication protocol at STB, which limits the service by the user-valued attribute to prevent illegal IPTV users. User attribute values change the order with bit form according to the certain rule, and apply to one-way hash function and Diffie-Hellman's elliptic curve key-exchange algorithm. The proposed protocol is able to improve on user authentication and computation. Also, each user generates an authentication message by smart card and receives various services based on the user-valued attribute.

Design and Implementation of The Spam I-Mail filtering System (컨텐츠 필터를 이용한 스팸메일 차단 시스템 설계 및 구현)

  • 김진만;장종욱
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2003.05a
    • /
    • pp.465-468
    • /
    • 2003
  • E-mail, one of the oldest services in internet becomes very important and essential way to communicate with development of internet. Due to E-mail has a property which is not complete for security, sometimes it is used for purpose of commercial or bad things, therefore it becomes the latest problem to keep off a Spam-mail and commercial advertising E-mail, many ways to keep off were perposed for it. In this paper, I explained how to sort and keep off these Spam-mail and commercial advertising E-mail with three way, prevention by server level, prevention by construction of network level, prevention by client level. we designed a prevention system for Spam-mail and implemented it by Visual Basic.

  • PDF

Research on the Inter-harmonics Equivalent Impedance of Series Hybrid Active Power Filter

  • Jian-gong, Zhang;Jian-ben, Liu;Shao-jun, Dai;Qiao-fu, Chen;Jun-jia, He
    • Journal of Electrical Engineering and Technology
    • /
    • v.10 no.5
    • /
    • pp.2062-2069
    • /
    • 2015
  • In the series hybrid active power filter (SHAPF) with magnetic flux compensation (MFC), the system current oscillate in the experimental results when adding the same phase harmonic current command in current control block. This condition endangers the security of the SHAPF. Taking the digit period average arithmetic as example, this paper explains the inter-harmonics current oscillation in the experiment. The conclusion is that the SHAPF is unstable to the inter-harmonics current in theory. Limited by the capacity of the inverter, the system current and the inverter output current do not increase to infinite. At last, some methods are proposed to solve this problem. From the practical viewpoint, the voltage feed-forward control is easy to achieve. It can suppress the current oscillation problems, and also improve the filtering effect. The feasibility of the methods is validated by both the emulation and experiment results.

Advances in Cyber-Physical Systems Research

  • Wan, Jiafu;Yan, Hehua;Suo, Hui;Li, Fang
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.5 no.11
    • /
    • pp.1891-1908
    • /
    • 2011
  • Cyber-physical systems (CPSs) are an emerging discipline that involves engineered computing and communicating systems interfacing the physical world. The widespread applications of CPSs still face enormous challenges because of the lack of theoretical foundations. In this technical survey, we review state-of-the-art design techniques from various angles. The aim of this work is to provide a better understanding of this emerging multidisciplinary methodology. The features of CPSs are described, and the research progress is analyzed using the following aspects: energy management, network security, data transmission and management, model-based design, control technique, and system resource allocation. We focus on CPS resource optimization, and propose a system performance optimization model with resource constraints. In addition, some classic applications (e.g., integrating intelligent road with unmanned vehicle) are provided to show that the prospects of CPSs are promising. Furthermore, research challenges and suggestions for future work are outlined in brief.

Design of False Alerts Reducing Model Using Fuzzy Technique for Intrusion Detection System (퍼지기법을 이용한 침입 탐지 시스템 오류경고메시지 축소 모델 설계)

  • Sung, Kyung
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2007.06a
    • /
    • pp.794-798
    • /
    • 2007
  • As the development of information technology and thus the growth of security incidents, so implement are coming out for defense the intrusion about the system. However the error detection program has got a difficulty to find out the intrusions because that has become so many false alert messages. In this study is how to reduce the messages for the false alerts which come from the internal of the network and using the Fuzzy techniques for reduce the uncertainty of the judge. Therefore it makes the model which can decrease false alert message for better detection.

  • PDF

AHP 기법을 이용한 안티바이러스 소프트웨어 평가 요인 분석

  • Kim, Jong-Ki;Hwang, Suk-Yeon;Lee, Dong-Ho
    • The Journal of Information Systems
    • /
    • v.14 no.1
    • /
    • pp.19-40
    • /
    • 2005
  • The history of computer virus comes along with that of computer. Computer virus han surfaced as a serious problem in information age. The advent of open network and widespread use of Internet made the problem even more urgent. As a method of defense for computer virus most companies use anti-virus software. Selecting appropriate anti-virus software involves various criteria and thus it is a multiple-attribute decision making problem. The purpose of this study is to prioritize anti-virus software evaluation factors. To do that, first of all, important evaluation factors are selected based on previous research on anti-virus software as well as general software evaluation models. Then, a questionnaire survey was conducted on end-users, system administrators and anti-virus software developers. The survey result was analyzed with ExpertChoice 2000 which is based on Analytic hierarchy Process technique. This study found that there are clear differences among three survey groups regarding the relative importance of overall evaluation factors. End-user group ranked "cost" first, but it was the least important factor to developer group. Developers pointed out "operational support" ad the most important factor. There were also obvious differences in the relative importance of detail evaluation items. Both end-users and system administrators shared 7 common items among top 10 most important items. Moreover, neither of the two groups ranked any of the items in the "operational support" factor in top 10, whereas all 4 items in the factor were included in top 10 by developer group.

  • PDF

A Study on Information Resources and Demands of NanoTechnology in Korea (나노기술 정보지원시스템 구축을 위한 국내 나노기술 정보자원 현황 및 정보수요엔 관한 조사 연구)

  • 소대섭;강상규;이호신
    • The Journal of the Korea Contents Association
    • /
    • v.2 no.3
    • /
    • pp.127-134
    • /
    • 2002
  • The progress of nanotechnology as a new concept technology will affect greatly the security of the future national competitiveness such as IT, BT and ET. Since nanotechnology is a interdisciplinary research area, a combinatorial system and network is needed for Sharing, diffusion and cooperation of knowledge information. Then we study on the present status of national NT information resources, survey on the status of national NT information resources, and survey on users demand for NT information in korea This study is useful for planning and design of NT information service system.

  • PDF