• 제목/요약/키워드: Network Security System

Search Result 2,681, Processing Time 0.066 seconds

Algorithm of Channel Selection for DMO Communication in TETRA System (TETRA 시스템에서 DMO 통신을 위한 채널 선택 알고리즘)

  • Lee, Soon-Hwa;Kim, Chang-Bock
    • Journal of Advanced Navigation Technology
    • /
    • v.17 no.5
    • /
    • pp.497-505
    • /
    • 2013
  • In TETRA(TErrestrial Trunked RAdio) standard, TMO(Trunked Mode Operation) communicates with the UE through the base station and it has a higher priority than DMO(Direct Mode Operation) which communicates with UE directly for channel allocation. As a result, the UE needs an algorithm which restricts the frequency allocation by TMO so that DMO can have a successful communication within the network. However, the TETRA DMO standard does not consider this issue. In this paper, we propose an active DMO channel selection algorithm which allocates a channel based on some additional information such as channel usage state of TMO and channel utilization of DMO. The experimental results show that the proposed algorithm outperforms existing DMO channel allocation scheme in terms of the transmission efficiency.

An Adaptive Transmission Power Control Algorithm for Wearable Healthcare Systems Based on Variations in the Body Conditions

  • Lee, Woosik;Kim, Namgi;Lee, Byoung-Dai
    • Journal of Information Processing Systems
    • /
    • v.15 no.3
    • /
    • pp.593-603
    • /
    • 2019
  • In wearable healthcare systems, sensor devices can be deployed in places around the human body such as the stomach, back, arms, and legs. The sensors use tiny batteries, which have limited resources, and old sensor batteries must be replaced with new batteries. It is difficult to deploy sensor devices directly into the human body. Therefore, instead of replacing sensor batteries, increasing the lifetime of sensor devices is more efficient. A transmission power control (TPC) algorithm is a representative technique to increase the lifetime of sensor devices. Sensor devices using a TPC algorithm control their transmission power level (TPL) to reduce battery energy consumption. The TPC algorithm operates on a closed-loop mechanism that consists of two parts, such as sensor and sink devices. Most previous research considered only the sink part of devices in the closed-loop. If we consider both the sensor and sink parts of a closed-loop mechanism, sensor devices reduce energy consumption more than previous systems that only consider the sensor part. In this paper, we propose a new approach to consider both the sensor and sink as part of a closed-loop mechanism for efficient energy management of sensor devices. Our proposed approach judges the current channel condition based on the values of various body sensors. If the current channel is not optimal, sensor devices maintain their current TPL without communication to save the sensor's batteries. Otherwise, they find an optimal TPL. To compare performance with other TPC algorithms, we implemented a TPC algorithm and embedded it into sensor devices. Our experimental results show that our new algorithm is better than other TPC algorithms, such as linear, binary, hybrid, and ATPC.

Anonymous Blockchain Voting Model using the Master Node Network (마스터 노드 네트워크를 사용한 블록체인 익명 투표 모델)

  • Cho, Jae-Han;Lee, Lee-Sub;Choi, Chang-Hoon
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.22 no.5
    • /
    • pp.394-402
    • /
    • 2021
  • Electronic voting systems have been widely used in many countries around the world since the mid-1990s. In recent years, studies have applied blockchain to existing electronic voting systems in order to provide reliability, fairness, and transparency for voters. This approach is highly useful as a technology that promotes decentralized citizen participation. However, the existing electronic voting systems using blockchain have not sufficiently considered anonymity. Lack of anonymity acts as an important constraint in cases of small- and medium-sized voting, which is often required in decentralized citizen participation. In this study, we propose a model that provides anonymity to a voting system using blockchain by applying the concept of the master node in Dash cryptocurrency. First, we define the differences in the requirements of the transfer and voting systems in blockchain. We propose a parallel and autonomous model and algorithm to provide anonymity in the blockchain-that is, a decentralized development environment. In addition, a discussion of security and the environment for the proposed model is described.

A Comparative Analysis of Research Trends in the Information and Communication Technology Field of South and North Korea Using Data Mining

  • Jiwan Kim;Hyunkyoo Choi;Jeonghoon Mo
    • Journal of Information Science Theory and Practice
    • /
    • v.11 no.1
    • /
    • pp.14-30
    • /
    • 2023
  • The purpose of this study is to compare research trends in the information and communication technology (ICT) field between North and South Korea and analyze the differences by using data mining. Frequency analysis, clustering, and network analysis were performed using keywords from seven South Korean and two North Korean ICT academic journals published for five years (2015-2019). In the case of South Korea (S. Korea), the frequency of research on image processing and wireless communication was high at 16.7% and 16.3%, respectively. North Korea (N. Korea) had a high frequency of research, in the order of 18.2% for image processing, 16.9% for computer/Internet applications/security, and 16.4% for industrial technology. N. Korea's natural language processing (NLP) sector was 11.9%, far higher than S. Korea's 0.7 percent. Student education is a unique subject that is not clustered in S. Korea. In order to promote exchanges between the two Koreas in the ICT field, the following specific policies are proposed. Joint research will be easily possible in the image processing sector, with the highest research rate in both Koreas. Technical cooperation of medical images is required. If S. Korea's high-quality image source is provided free of charge to N. Korea, research materials can be enriched. In the field of NLP, it calls for proposing exchanges such as holding a Korean language information conference, developing a Korean computer operating system. The field of student education encourages support for remote education contents and management know-how, as well as joint research on student remote evaluation.

A Blockchain-based User-centric Role Based Access Control Mechanism (블록체인 기반의 사용자 중심 역할기반 접근제어 기법 연구)

  • Lee, YongJoo;Woo, SungHee
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.26 no.7
    • /
    • pp.1060-1070
    • /
    • 2022
  • With the development of information technology, the size of the system has become larger and diversified, and the existing role-based access control has faced limitations. Blockchain technology is being used in various fields by presenting new solutions to existing security vulnerabilities. This paper suggests efficient role-based access control in a blockchain where the required gas and processing time vary depending on the access frequency and capacity of the storage. The proposed method redefines the role of reusable units, introduces a hierarchical structure that can efficiently reflect dynamic states to enhance efficiency and scalability, and includes user-centered authentication functions to enable cryptocurrency linkage. The proposed model was theoretically verified using Markov chain, implemented in Ethereum private network, and compared experiments on representative functions were conducted to verify the time and gas efficiency required for user addition and transaction registration. Based on this in the future, structural expansion and experiments are required in consideration of exception situations.

Device RDoS Attack Determination and Response System Design (디바이스의 DDoS 공격 여부 판단 및 대응 시스템 설계)

  • Kim, Hyo-jong;Choi, Su-young;Kim, Min-sung;Shin, Seung-soo
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2021.05a
    • /
    • pp.108-110
    • /
    • 2021
  • Since 2015, attacks using the IoT protocol have been continuously reported. Among various IoT protocols, attackers attempt DDoS attacks using SSDP(Simple Service Discovery Protocol), and as statistics of cyber shelters, Korea has about 1 million open SSDP servers. Vulnerable SSDP servers connected to the Internet can generate more than 50Gb of traffic and the risk of attack increases gradually. Until recently, distributed denial of service attacks and distributed reflective denial of service attacks have been a security issue. Accordingly, the purpose of this study is to analyze the request packet of the existing SSDP protocol to identify an amplification attack and to avoid a response when an amplification attack is suspected, thereby preventing network load due to the occurrence of a large number of response packets due to the role of traffic reflection amplification.

  • PDF

A Study on Countermeasures on Seabed Warfare: Focused on Submarine Cables (해저전 대응방안 연구: 해저케이블을 중심으로)

  • Cho, Seong-jin;Lim, Soohoon
    • Maritime Security
    • /
    • v.8 no.1
    • /
    • pp.103-128
    • /
    • 2024
  • The Nord Stream explosion and the damage to submarine cables in the Baltic Sea and Red Sea have raised interest in seabed warfare all the world. And each country is preparing response plans and strategy. However, although South Korea relies on submarine cables for most of its internet network and is vulnerable to threats from North Korea and neighboring countries, even the term Seabed Warfare is unfamiliar. This paper is the first domestic study to analyze the definition and characteristics of seabed warfare, the current status of each country, and suggest countermeasures. In order to respond to seabed warfare, I propose establishing a cooperative system based on Mini-multilateralism between countries that share an international rules-based order, and establishing governance with related domestic organizations and companies. And I propose a military response plan based on deterrence by denial and deterrence by retaliation

  • PDF

Practical approaches to becoming the logistics hub of Northeast Asia (동북아 물류중심국가 추진전략에 관한 연구)

  • Oh, Moon-Kap
    • Journal of Distribution Science
    • /
    • v.11 no.6
    • /
    • pp.31-40
    • /
    • 2013
  • Purpose - The Northeast Asian Logistic Hub strategy was established to create a national competitive advantage in northeast Asia. Countries in this region are competing fiercely to become the central base distribution port as the volume of container shipping continues to increase due to the northeast Asian (especially Chinese) economic growth. The primary method by which shippers are improving their customer service and distribution is enhancing profits by minimizing call ports on the key route through strategic affiliations and the use of large vessels. Each nation is planning large-scale investments in the construction of sea ports that can accommodate large vessels. This paper proposes ways by which the logistical strategies of domestic corporations can keep pace with changes in government policy concerning the Northeast Asian Business Hub policy. It examines the logistics system in the Northeast Asian region, analyzes the government's Northeast Asian Business Hub policy, and suggests logistical strategies for domestic corporations through an analysis based on a questionnaire designed to grasp domestic firms' needs and goals. Research design, data and methodology - The purpose of this study is to determine how shipping companies establish partnerships with third-party logistics providers and draws out the implications of the results. The survey methods used were personal interviews and questionnaires distributed to a sample population through e-mail, fax, mail, and telephone. A total of 600 questionnaires were distributed, of which 165 were returned. Among these, ten were excluded due to insufficient content; ultimately, 155 were used for the sample. The statistical data collection process was analyzed through data coating and a statistical package program. Results - This study argues that greater flexibility in policies, administration, and systems will be needed to significantly improve established business practices. In this dissertation, we primarily identify that in order to become a center of northeast Asian logistics, Korea must adopt a new paradigm and abandon the existing systems that are based on the economic and social systems that have stemmed from bureaucracy, inflexibility, chauvinism, and equalitarianism. Flexible policies, administration, and systems will be necessary to improve business practices. Domestic corporations must establish a strategic logistics hub and related network while simultaneously pursuing value-added logistics businesses by increasing their manpower and building a logistics information system. This will strengthen their competitive edge and lead to system improvements. Conclusions - Domestic corporations must adopt a new paradigm and use more reasonable business laws, systems, and policies that are based on market-driven flexibility and transparency. Moreover, social norms and regulations should be established to help ensure political and social security. Korea must also develop a culture of tolerance for foreign companies. Finally, the paradigm defining the policy governing the development of the capital city and its satellite cities in this context must be changed.

The Construction Direction of the ROK NAVY for the Protection of Marine Sovereignty (국가의 해양주권 수호를 위한 한국해군의 전력건설 방향)

  • Shin, In-Kyun
    • Strategy21
    • /
    • s.30
    • /
    • pp.99-142
    • /
    • 2012
  • Withe increased North Korea's security threats, the South Korean navy has been faced with deteriorating security environment. While North Korea has increased asymmetric forces in the maritime and underwater with the development of nuclear weapons, and China and Japan have made a large investment in the buildup of naval forces, the power of the Pacific fleet of the US, a key ally is expected to be weakened. The biggest threat comes from China's intervention in case of full-scale war with North Korea, but low-density conflict issues are also serious problems. North Korea has violated the Armistice Agreement 2,660 times since the end of Korean War, among which the number of marine provocations reaches 1,430 times, and the tension over the NLL issue has been intensifying. With tension mounting between Korea and Japan over the Dokdo issue and conflict escalating with China over Ieo do Islet, the US Navy has confronted situation where it cannot fully concentrate on the security of the Korean peninsula, which leads to need for strengthening of South Korea's naval forces. Let's look at naval forces of neighboring countries. North Korea is threatening South Korean navy with its increased asymmetric forces, including submarines. China has achieved the remarkable development of naval forces since the promotion of 3-step plan to strengthen naval power from 1989, and it now retains highly modernized naval forces. Japan makes an investment in the construction of stat of the art warship every year. Since Japan's warship boasts of its advanced performance, Japan's Maritime Self Defense Force is evaluated the second most powerful behind the US Navy on the assumption that submarine power is not included in the naval forces. In this situation, naval power construction of South Korean navy should be done in phases, focusing on the followings; First, military strength to repel the energy warship quickly without any damage in case of battle with North Korea needs to be secured. Second, it is necessary to develop abilities to discourage the use of nuclear weapons of North Korea and attack its nuclear facilities in case of emergency. Third, construction of military power to suppress armed provocations from China and Japan is required. Based on the above naval power construction methods, the direction of power construction is suggested as follows. The sea fleet needs to build up its war potential to defeat the naval forces of North Korea quickly and participate in anti-submarine operations in response to North Korea's provocations. The task fleet should be composed of 3 task flotilla and retain the power to support the sea fleet and suppress the occurrence of maritime disputes with neighboring countries. In addition, it is necessary to expand submarine power, a high value power asset in preparation for establishment of submarine headquarters in 2015, develop anti-submarine helicopter and load SLAM-ER missile onto P-3C patrol aircraft. In case of maine corps, division class military force should be able to conduct landing operations. It takes more than 10 years to construct a new warship. Accordingly, it is necessary to establish plans for naval power construction carefully in consideration of reality and future. For the naval forces to safeguard maritime sovereignty and contribute to national security, the acquisition of a huge budget and buildup of military power is required. In this regard, enhancement of naval power can be achieved only through national, political and military understanding and agreement. It is necessary to let the nation know that modern naval forces with improved weapon system can serve as comprehensive armed forces to secure the command of the sea, perform defense of territory and territorial sky and attack the enemy's strategic facilities and budget inputted in the naval forces is the essential source for early end of the war and minimization of damage to the people. If the naval power construction is not realized, we can be faced with a national disgrace of usurpation of national sovereignty of 100 years ago. Accordingly, the strengthening of naval forces must be realized.

  • PDF

The Excluded from Public Pension : Problem, Cause and Policy Measures (공적연금의 사각지대 : 실태, 원인과 정책방안)

  • Seok, Jae-Eun
    • Korean Journal of Social Welfare
    • /
    • v.53
    • /
    • pp.285-310
    • /
    • 2003
  • As National Pension Scheme for all nation complete in 1999 through expanding application in cities, the public pension including Public Occupational Pension became main axis of old-age income maintenance. After 4years since then, now, it is only half of total National Pension insured persons who have been qualified to receive pension through participate and contribution. The other half of National Pension insured is left the excluded from public pension. This paper is intended to identify scale and characteristics of the excluded from public pension and to analysis its cause, and to explore policy measures for solving the excluded's problem. for current recipients over 60 years old generation, the its excluded's scale is no less than 86% of the old over 60 years. The probability of getting in the excluded is high in case of old elderly and female for current elderly generation. For future recipients 18-59 years working generation, the its excluded's scale is no less than 61% of the 18-59 years total population. The probability of getting in the excluded is high in case of 18-29 years and female for current working generation. As logistic regression analysis determinant factor of paying or not pension contribution for future recipients, it appear that probability of getting in the excluded for current working generation is high in case of younger old, lower education attainment, irregular employee, working at agriculture forestry fishery sector, construction sector, wholesale retail trade restaurants hotels sector, financial institution and insurance real estate renting and leasing sector in comparison with manufacturing sector, occpaying at elementary occupation, professionals technicians and associate professionals, sale and service workers, plant machine operators and assemblers, legislators senior officials and managers in comparison with clerks. The Policy measures for the current recipient old generation have need to reinforce supplemental role of Senior's pension(non-contribution pension) until maturing of public pension, because of no having chance of public pension participants for them. And the Policy measures for the future recipient working generation have need to restructure social security fundamentally corresponding with social-economic change as labour market and family structure etc. The pension system has need to change from one earner one pension to one citizen one pension with citizenship rights. At this point, public pension have need to manage with combining insurance's contribution principle and citizenship principle financing by taxes. Then public pension will become substantially universal social network for old-age income maintenance and we can find real solution for the excluded from.

  • PDF