• Title/Summary/Keyword: Platform security

Search Result 821, Processing Time 0.031 seconds

The Security Risk and Countermeasures of Blockchain based Virtual Currency Trading (블록체인 기반 가상화폐 거래의 보안 위험 및 대응방안)

  • Chung, Young-Seek;Cha, Jae-Sang
    • The Journal of Korea Institute of Information, Electronics, and Communication Technology
    • /
    • v.11 no.1
    • /
    • pp.100-106
    • /
    • 2018
  • Since the concept of virtual currency called Bitcoin was announced in 2008, the blockchain technology, which is the basis of Bitcoin, is attracting attention as an important platform technology in the era of the 4th industrial revolution that can change our society in the future. Although Existing electronic financial transactions store and manage all transaction history at a reliable central organization such as government and bank, blockchain-based electronic financial transactions are composed of a distributed structure in which all participants participating in the transaction store and manage the transaction history, it is possible to secure transaction transparency while reducing system construction and operation costs. Besides the virtual currency that started with bit coins, the technology of these blockchains has been extended in various fields such as smart contracts and document management. The key technology area of this blockchain is security based on proven cryptographic technology to make it difficult to forge and hack, but there are security risks such as security vulnerabilities in the virtual currency trading service, We will discuss security risks in using virtual currency and discuss countermeasures. Especially security accidents of virtual currency exchanges are occurring frequently recently, the damage of users who trade the virtual currency is also increasing, we propose security threats and security countermeasures against virtual currency exchanges.

A Study on the Transition of North Korean Income Security Terminology: 1936-2013 (북한 소득보장 용어의 변천에 관한 연구: 1936-2013)

  • Min, Kichae
    • The Journal of the Convergence on Culture Technology
    • /
    • v.6 no.4
    • /
    • pp.1-8
    • /
    • 2020
  • Existing studies have used a variety of terms related to North Korea's income guarantees, causing some confusion. It can be said that it is a problem that appears only when dealing with the contents of a specific statute in an existing study. To this end, we will look at the laws and regulations related to income security by period and analyze the contents of dictionaries that are also the explanations of the laws and the status of orders and rules. As a result of the analysis, living subsidies are classified into subsidies under the national social insurance system and pension and subsidy under the national social security system. Among them, the pension under the national social security system, which is an income security system for non-workers, includes old age pensions, labor capacity loss pension(general work ability loss pension, accidental work ability loss pension, honored soldiers' work ability loss pension), and survivor pension(general survivor pension, war deads' survivor pension, victims' survivor pension). In particular, it was confirmed that the terminology for social security pension, which has been confusing in previous studies, is a collective jargon for all pensions under the national social security system. This study is significant in that it synthesized the historical transition process of the terminology of income security from the 10th Platform for the National Liberation Society in 1936 to the Socialist Constitution of the Democratic People's Republic of Korea in 2013.

Debating Universal Basic Income in South Korea (기본소득 논쟁 제대로 하기)

  • Back, Seung Ho;Lee, Sophia Seung-yoon
    • 한국사회정책
    • /
    • v.25 no.3
    • /
    • pp.37-71
    • /
    • 2018
  • Since 2016, public and political interest on basic income has been increased beyond academic interest. The recent debate on basic income has expanded on issues regarding to the concrete implementation of basic income moving further than the debate on conception of the basic income in the abstract level. This study examines major critiques of basic income which was raised from social policy area and makes a counter-argument on these critiques. Major points summarized as follows. First, the problem of jobs and social insurance exclusion is not serious enough to call for basic income. Second, existing social security systems will be crowded out by excessive financial burden if basic income is introduced. Third, policies to cultivate citizens' capacities to cope with a technological change should be given priority over basic income. This study disputes these critiques by counter arguing four points. First, it is necessary to reconstruct welfare state based on basic income, given the labor market changes, such as long-term trend of employment change, newly emerging employment of platform companies, and inconsistency of platform labor and social insurance. Second, hypothesis of crowding-out effect on social security system is just a criticism that can be applied to the basic income initiative of the right-wing. Also, it is unable to find a logical basis or evidence of this hypothesis from the historical process of welfare state development or previous studies. Third, it is necessary to discuss how to reconfigure existing social security system and basic income which are complementary to each other and also have consistency with labor market as a configuration, not as a matter of choosing between basic income and social security system. Fourth, de-laborization does not mean a refusal to labor but a free choice, and the basic principle of social security is not needs but right. In conclusion, in order to develop more productive debate on basic income, it requires more sophisticated discussion and criticism from the point of view of the distributive justice; the debate on the sustainability of social insurance-centered welfare states; and debates on the political realization of basic income.

A Virtual Laboratory to Practice Mobile Wireless Sensor Networks: A Case Study on Energy Efficient and Safe Weighted Clustering Algorithm

  • Dahane, Amine;Berrached, Nasr-Eddine;Loukil, Abdelhamid
    • Journal of Information Processing Systems
    • /
    • v.11 no.2
    • /
    • pp.205-228
    • /
    • 2015
  • In this paper, we present a virtual laboratory platform (VLP) baptized Mercury allowing students to make practical work (PW) on different aspects of mobile wireless sensor networks (WSNs). Our choice of WSNs is motivated mainly by the use of real experiments needed in most courses about WSNs. These experiments require an expensive investment and a lot of nodes in the classroom. To illustrate our study, we propose a course related to energy efficient and safe weighted clustering algorithm. This algorithm which is coupled with suitable routing protocols, aims to maintain stable clustering structure, to prevent most routing attacks on sensor networks, to guaranty energy saving in order to extend the lifespan of the network. It also offers a better performance in terms of the number of re-affiliations. The platform presented here aims at showing the feasibility, the flexibility and the reduced cost of such a realization. We demonstrate the performance of the proposed algorithms that contribute to the familiarization of the learners in the field of WSNs.

Provable Secure Brand-new Multi-auction Mechanism with Dynamic Identity

  • Lee, Jung-San;Wei, Kuo-Jui;Chen, Ying-Chin;Sun, Yun-Hsiang
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.10 no.12
    • /
    • pp.5616-5642
    • /
    • 2016
  • Different from traditional auctions, electronic auctions provide a platform to allow bidders and auctioneers merchandise to each other over network anytime and anywhere. Auctioneers can publish information of goods, and bidders can choose the interested targets through this bidding platform. To ensure the fairness and security of electronic auctions, Li et al. have proposed a practical electronic auction scheme which can confirm the requirement of strong anonymity, bidding privacy, and secret bidding price. However, we have found out that Li et al.'s scheme may lurk the risk of the denial-of-service attack during the bidding phase in a sealed-bid auction. Thus, we propose a brand-new sealed-bid auction mechanism, in which the essentials of e-auction can be firmly preserved. In particular, each bidder only needs to register at the center once and then can join to multiple plays launched by different auctioneers. Moreover, the correctness of mutual authentication is confirmed according to the BAN logic model.

Design and Implementation of Digital Door Lock by IoT (사물인터넷을 이용한 디지털 도어락, DDiT의 설계 및 구현)

  • Seo, Dae Gyu;Ko, Han Shin;Noh, Yong Deok
    • KIISE Transactions on Computing Practices
    • /
    • v.21 no.3
    • /
    • pp.215-222
    • /
    • 2015
  • In this paper, the Digital DoorLock by Internet of Things (DDiT) is introduced. In order to implement DDiT, an integrated micro-controller platform, Arduino is used to control an existing digital doorlock and an android type smart phone is adopted as a mobile platform. One of the advantages of DDiT is that it can be added to an existing digital doorlock and a smart phone application is used as a digital key. Owing to the smart phone application, several other types of applications could also be made. Therefore, DDiT could be used effectively and conveniently in ordinary homes as well as in high security applications such as in hotels, institutes, and companies.

Modern Software Defined Radar (SDR) Technology and Its Trends

  • Kwag, Young-Kil;Jung, Jung-Soo;Woo, In-Sang;Park, Myeong-Seok
    • Journal of electromagnetic engineering and science
    • /
    • v.14 no.4
    • /
    • pp.321-328
    • /
    • 2014
  • Software defined radar (SDR) is a multi-purpose radar system where most of the hardware processing is performed by software. This paper introduces a concept and technology trends of software defined radar, and addresses the advantages and limitations of the current SDR radar systems. For the advanced SDR concept, the KAU SDR Model (KSM) is presented for the multimode and multiband radar system operating in S-, X-, and K-bands. This SDR consists of a replaceable multiband antenna and RF hardware, common digital processor module with multimode, and open software platform based on MATLAB and LabVIEW. The new concept of the SDR radar can be useful in various applications of the education, traffic monitoring and safety, security, and surveillance depending on the various radar environments.

An Intelligence Embedding Quadruped Pet Robot with Sensor Fusion (센서 퓨전을 통한 인공지능 4족 보행 애완용 로봇)

  • Lee Lae-Kyoung;Park Soo-Min;Kim Hyung-Chul;Kwon Yong-Kwan;Kang Suk-Hee;Choi Byoung-Wook
    • Journal of Institute of Control, Robotics and Systems
    • /
    • v.11 no.4
    • /
    • pp.314-321
    • /
    • 2005
  • In this paper an intelligence embedding quadruped pet robot is described. It has 15 degrees of freedom and consists of various sensors such as CMOS image, voice recognition and sound localization, inclinometer, thermistor, real-time clock, tactile touch, PIR and IR to allows owners to interact with pet robot according to human's intention as well as the original features of pet animals. The architecture is flexible and adopts various embedded processors for handling sensors to provide modular structure. The pet robot is also used for additional purpose such like security, gaming visual tracking, and research platform. It is possible to generate various actions and behaviors and to download voice or music files to maintain a close relation of users. With cost-effective sensor, the pet robot is able to find its recharge station and recharge itself when its battery runs low. To facilitate programming of the robot, we support several development environments. Therefore, the developed system is a low-cost programmable entertainment robot platform.

Simple Identification Methods for Unknown Suspicious White Powders using Microfluidic-based Platform (미세유체 기반의 플랫폼을 이용한 미지의 백색가루 간이식별 탐지방안)

  • Park, Jae Woo;Song, Jiyoung;Na, Sang Cheol;Byun, Kisik;Jeon, Noo Li
    • Journal of the Korea Institute of Military Science and Technology
    • /
    • v.20 no.6
    • /
    • pp.853-859
    • /
    • 2017
  • Terrorists always threats the global security with the possibility of using prohibited warfare, NBCs(Nuclear, Biological and Chemical Warfare). Compared to other prohibited warfares, most of biological warfare agents (BWAs) have no physical properties and time delays from spread to affect. Therefore the early detection is important to protect and decontaminate from BWAs. On the preliminary detection stage for suspicious material, most of detection kits only serve to know weather the BWAs exists or not. Due to this reason, simple field confirmation testing for suspicious substances have been used to identify materials which show negative result on detection kits. Considering the current Lab on a Chip(LOC) technologies, we suggest simple identification platform for unknown suspicious substances based on paper fluidics. We hope that our research will envision the future direction for the specific point-of-view for LOC technologies on detection strategy of BWAs.

A Study on the Factors Affecting the Intention to Use O2O Services (O2O 서비스의 사용의도에 영향을 미치는 요인에 관한 연구)

  • Jeong, Yu Jin;Song, Yong Uk
    • Journal of Information Technology Services
    • /
    • v.15 no.4
    • /
    • pp.125-151
    • /
    • 2016
  • In recent years, O2O (Online to Offline) services get a lot of attention to improve the trust in online shopping and minimize the inconvenience and the cost burden in offline shopping as the number of consumers, who do not show concern about the purchase platform like online or offline, increases. Even though the services have been getting the spotlight as a strong business platform for next generation commerce, there have been only a few studies on the O2O services. The purpose of this research is to investigate the factors which affect the consumer's intention to use location-based O2O services. The study is based on VAM (Value-based Adoption Model) which is able to analyze those factors from the aspects of benefit and sacrifice. We used the partial least squares (PLS) method for empirical analysis, and the result shows that contextual offers, instant connectivity, webrooming and economic efficiency, which fall under the benefit, affect perceived value positively while annoyance and face consciousness, which fall under the sacrifice, do not affect perceived value significantly. In addition, contextual offers and instant connectivity affect trust positively. Location accuracy, which falls under the benefit of location-based O2O service, do not significantly affect perceived value and trust while security risk affects trust and use intention negatively. It appears that trust affects perceived value and use intention positively.