• Title/Summary/Keyword: Physical Network

Search Result 1,876, Processing Time 0.024 seconds

A Study on Development of Attack System on the 2.4 GHz AES Wireless Keyboard (2.4 GHz AES 무선 키보드 공격 시스템 구축에 관한 연구)

  • Lee, Ji-Woo;Sim, Bo-Yeon;Park, Aesun;Han, Dong-Guk
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.42 no.1
    • /
    • pp.233-240
    • /
    • 2017
  • Due to a recent rise in use of a wireless keyboard and mouse, attacks which take user's input information or control user's computer remotely exploiting the physical vulnerability in the wireless communication have been reported. Especially, MouseJack, announced by Bastille Network, attacks 2.4 GHz wireless keyboards and mice through exploiting vulnerability of each manufacturer's receiver. Unlike other attacks that have been revealed, this allows to attack AES wireless keyboards. Nonetheless, there is only a brief overview of the attack but no detailed information on this attacking method. Therefore, in this paper we will analyze the Microsoft 2.4 GHz wireless mouse packet and propose a way to set the packet configuration for HID packet injection simulating a wireless mouse. We also develop a system with 2.4 GHz AES wireless keyboard HID packet injection using the proposed packet and demonstrate via experiment that HID packet injection is possible through the system we built.

SoFA: A Distributed File System for Search-Oriented Systems (SoFA: 검색 지향 시스템을 위한 분산 파일 시스템)

  • Choi, Eun-Mi;Tran, Doan Thanh;Upadhyaya, Bipin;Azimov, Fahriddin;Luu, Hoang Long;Truong, Phuong;Kim, Sang-Bum;Kim, Pil-Sung
    • Journal of the Korea Society for Simulation
    • /
    • v.17 no.4
    • /
    • pp.229-239
    • /
    • 2008
  • A Distributed File System (DFS) provides a mechanism in which a file can be stored across several physical computer nodes ensuring replication transparency and failure transparency. Applications that process large volumes of data (such as, search engines, grid computing applications, data mining applications, etc.) require a backend infrastructure for storing data. And the distributed file system is the central component for such storing data infrastructure. There have been many projects focused on network computing that have designed and implemented distributed file systems with a variety of architectures and functionalities. In this paper, we describe a complete distributed file system which can be used in large-scale search-oriented systems.

  • PDF

Safety Management Network of Sports Facilities Abroad and System Status (해외의 스포츠시설 안전관리 네트워크 및 시스템 현황)

  • Kim, Il-Gwang;Kwon, Hei-Won;Choi, Jin-Ho
    • Journal of Digital Convergence
    • /
    • v.14 no.6
    • /
    • pp.547-562
    • /
    • 2016
  • The purpose of this research was to provide the information of mandatory regulation for Korean sports facilities and the preliminary data for building sport safety management manual through sports facilities abroad and system status. Futhermore, based on the information of sports facilities safety management, this research performed the benchmarking of each country sports facilities safety management system. As a result, in the U.S, Department of Homeland Security(DHS) leads effort to achieve a safe, secure, and resilient homeland. In Germany, law & regulations, sports facilities safety guideline and expert extension have been reviewed. Germany is more realistic and practical than other countries. In Australia, Major Hazard Facilities(MHF) is responsible for eliminating the risk of a major incident. Emergency Management System(EMS) should spontaneously respond when the alarm is raised as early detection and intervention are vital to ensuring that a small incident does not escalate to become a major disaster.

A Study on CA-VPN Design using Authentication Mechanism (인증 메커니즘을 이용한 CA-VPN 설계에 관한 연구)

  • 김도문;전정훈;전문석
    • Journal of the Korea Society of Computer and Information
    • /
    • v.8 no.1
    • /
    • pp.60-68
    • /
    • 2003
  • Now the development of using a internet and security equipment is Processed actively. But It is presented problems about compatability and availability between variable equipment as several protocol. It is able to occur the Problem which is not considered efficiency as monopoly security equipment for the standardization of some vendor As a using of VPN gateway equipment. the same equipments have been actually used only for sale a communication equipment which are not confirmed(authenticate) between of mutual equipments. These problem is remain which are not considered suitable network environment and Position by mutual authentication Processing. Because it is considered for only sale a equipment of several vendor. And You will be remain where is unable to protect from attack of using the same equipment, and You will need a actually Protected method. By authentication system of base on Pn , although there is an intended attack from the third intruder, users can be protected with safe from the physical attacks since he is not a Permitted user by employing CA-VPN gateway that is more viable than the previous VPN connection in its security and certification.

  • PDF

Increasing Effect Analysis of the Wind Power Limit Using Energy Storage System in Jeju-Korea (에너지저장장치를 이용한 제주지역 풍력발전 한계용량 증대효과 분석)

  • Kim, Yeong-Hwan;Kim, Se-Ho
    • Journal of the Korean Solar Energy Society
    • /
    • v.34 no.1
    • /
    • pp.81-90
    • /
    • 2014
  • The Jeju-Korea power system is a small-sized network with a system demand ranging from a autumn minimum of 350MW to a summer peak of 716MW. Because Jeju island is well exposed to north-east winds with high speed, applications to connect to Jeju power system are flooded. Considering physical/environmental constraints, Jeju Self-governing Province has also target for the wind power capacity of 1,350MW by 2020. It amounts to two or three times of Jeju average-demand power and wind power limit capacity announced by Korea Power Exchange (KPX) company. Wind farm connection agreements will be signed to maximize utilization of wind resource. In spite of submarine cable HVDC connected to Korea mainland, Jeju power system is independently operated by frequency and reserve control. This study reevaluates wind power limit based on the KPX criteria from 2016 to 2020. First of all wind power generation limit are affected by off-peak demand in Jeju power system. Also the possibility capacity rate of charging wind power output is evaluated by using energy storage system (ESS). As a result, in case of using 110MWh ESS, wind power limit increases 33~55MW(30~50% of ESS), wind power constraint energy decreases from 68,539MWh to 50,301MWh and wind farm capacity factor increases from 25.9 to 26.1% in 2020.

Decision Making for the Industrial Security Management Measures' Importance in Operation Level (운영 수준에서의 산업보안 관리대책 중요도 결정)

  • Chae, Jeong-Woo;Jeong, Jin-Hong
    • The Journal of the Korea Contents Association
    • /
    • v.13 no.4
    • /
    • pp.389-398
    • /
    • 2013
  • This study aims to support rational security investment decision making through prioritizing on operational level of management measures strategically, in carrying out industrial security activities. For this, AHP survey is conducted against industrial security professionals and analyzed. Thereafter, the importance and the priority of industrial security management measures are determined. As a result, in a comparison evaluation among the criteria, 'ICT service management' represents the highest weight (0.54). And the sub-criteria could be divided into three groups (Group I, II, III), depending on their importance. The sensitivity analysis results show that if the weight of the criterion, 'ICT systems/networks access control' is doubled, the sub-criteria, 'O/S access control', 'application access control', and 'wired/wireless network access control' are enter into top rank group. In case of the criterion, 'physical/environmental security' is doubled, the sub-criteria, 'protection zoning/access control' and 'disaster prevention on business equipment/counter-terrorism' are enter into the top rank group, 'securing utilities' is enter into the mid rank group.

A Study of Asset and Risk Assessment for Established of Industrial Security Management System (산업보안 경영시스템 구축을 위한 자산 및 위험평가에 관한 연구)

  • Koh, Joon-Cheol;Kim, Tae-Soo;Joo, Yong-Ma;Kim, Woo-Hyun;Kang, Kyung-Sik
    • Journal of the Korea Safety Management & Science
    • /
    • v.12 no.4
    • /
    • pp.1-11
    • /
    • 2010
  • The purpose of this study is, by recognizing that recently, as crimes using information and various adverse-effect phenomena such as hacking and virus occur frequently with rapid development of information network such as Internet in every field of industry, the range of security is widening to the field of industrial areas for preventing the leaking of industrial technology and protecting that technology as well as information security only limited to IT area, and by establishing common concept about industrial security through education on the industrial security at the point of increasing importance of industrial security, to prepare the base of comprehensive risk management system for protecting company's assets (physical factor, technical factor and managerial factor) safely from the random threats or attacks inside and outside the company through assessment of important assets of the company, evaluation of threats and weak points, and risk assessment by building industrial security management system in order to protect company's information assets and resources which are connected to the existence of the company safely from the threats or attacks from inside or outside the company and to spread stable business activities.

Connected-IPs: A Novel Connected Industrial Parks Architecture for Building Smart Factory in Korea (연결형 산업단지(CIPs): 한국의 스마트공장 구축을 위한 연결형 산업단지 아키텍처)

  • Yang, Young-Chuel;Jeong, Jongpil
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.18 no.4
    • /
    • pp.131-142
    • /
    • 2018
  • In Korea, for the past 50 years, industrial parks have played an important role in economic growth as a cluster of national key industries. However, due to various problems of these old industrial parks, they are weakening competitiveness. It is necessary to be converted into a model for the management and fostering of high-tech industrial complex park by classifying them into development plans, management plans, and support plans according to types and characteristics of industrial parks. For this purpose, we propose CIPs (Connected-Industrial parks) using new technologies such as Cloud Computing, RFID, WSN, CPS, and Big Data analysis based on IoT. It is a hub that supports various services in transportation, warehousing and manufacturing fields while possessing and operating physical assets as concept. each CIP (Connected-Industrial park) is connected and expanded Through such CIPs, network-type collaborative manufacturing and intelligent logistics innovation enables cost reduction, delivery shortening, quality improvement.

Orthogonally-Polarized Dual-Band Switchable Microstrip Antenna Using PIN-Diode Loaded H-Shape Slot (PIN 다이오드가 구비된 H 모양 슬롯을 이용한 직교편파 이중대역 변환 마이크로스트립 안테나)

  • Lim, Eunsook;Pyo, Seongmin
    • The Journal of Korean Institute of Electromagnetic Engineering and Science
    • /
    • v.27 no.2
    • /
    • pp.156-162
    • /
    • 2016
  • This paper proposes a novel orthogonally-polarized dual-band switchable microstrip antenna. The proposed antenna consists of a perpendicular feeding network and an radiator with a PIN-installed H-shaped slot. When the states of one single PIN diode in H-slot are controlled by bias voltages, the controlled physical geometry of the H-slot determines the operation frequencies of switchable 1.80 GHz and 2.43 GHz for vertically polarized linear polarization and fixed 2.06 GHz for horizontally linear polarization. The implemented antenna experimentally demonstrates reconfigurable dual-band capability by means of controling the states of the PIN diode. The simulation and measurement results of the implemented antenna have been in good agreement with the reflection coefficients, realized antenna gains and far-field radiation patterns at each of the PIN diode states.

Caregiving for the Long-Term Care Elderly Women - Focusing on Caregiving Characteristics and Depression - (장기 보호 여성노인의 수발에 관한 연구 - 수발특성과 우울을 중심으로 -)

  • 김태현
    • Journal of the Korean Home Economics Association
    • /
    • v.41 no.6
    • /
    • pp.143-156
    • /
    • 2003
  • The present study was initially designed to figure out the general condition of care giving system for the elderly women who need long term care and the level of their depression according to the conditions of care. And This research is intented to present appropriate policy that could help the establishment of supporting system for the fragile elderly women.1 used the data from <2001 National Study on the Needs for the Long-Term Care Elderly> by Korea Health and Population Institute. The results are as follows: First, Two third of all the respondents had serious problems (2-9 activities limits) in Instrumental Daily Living Ability(DAL). Most respondents reported “low” in satisfaction level related to receiving care, meaning the elderly had negative perception for the care from the family. The elderly expected their children to be as the primary care giver and mostly wanted to live with them in the future. Second, The majority of the long term care elderly women haven't used community service facilities very often and said they are not likely going to use the facilities in the future. Third, The respondents reported high in depression level as to lower satisfaction with their children's support, poorer health condition, more reluctant to use service facilities due to the cost, and fewer friends and neighbors resources around them. Therefore I could say that negative factors for the elderly women's psychological health were having unsatisfactory relationship with intimate people, developing physical illness, being in economic difficulties. That is, receiving less help from close family members, shrinking social network, and experiencing economic hardship would have negative effects on elderly women's psychological health. In the basis of these results, I suggest that in the mean time we shouldn't overlook the importance of the private support when we develop the public elderly support system.