• Title/Summary/Keyword: Safe Network

Search Result 601, Processing Time 0.03 seconds

A Study on the Design of the Gateway for a Strong and Safe Mobile Agent System (강하고 안전한 이동 에이전트 시스템을 위한 게이트웨이 설계에 관한 연구)

  • Kim Hyo-Nam
    • Journal of the Korea Society of Computer and Information
    • /
    • v.9 no.3
    • /
    • pp.183-188
    • /
    • 2004
  • In the course of Internet proliferation. many network-related technologies are examined for possible growth and evolution. The use of Internet-based technologies in private networks has further fuelled the demand for network-based applications. The most Promising among the new paradigms is use of mobile agents. It also however, suffers from a major drawback, namely the potential for malicious attacks, abuse of resources pilfering of information, and other security issues. These issues are significantly hampering the acceptance of the mobile-agent paradigm. This paper proposed the design of strong and safe mobile agent gateway that split and merge the agent code with security policy database. This mechanism will promote the security in mobile agent systems and mobile agent itself.

  • PDF

A Design of Device Identification and Communication Method for Secure Device Monitoring based Smart Phone (스마트폰 기반에서 안전한 디바이스 모니터링을 위한 디바이스 식별 및 통신 기법 설계)

  • Jin, Byungwook;Ahn, Heuihak;Jun, Moonseog
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.13 no.1
    • /
    • pp.69-78
    • /
    • 2017
  • As the smartphone-based devices are diffused and developed rapidly, they provide the convenience to the users. The abovementioned sentence technologies are being used not only in the existing sensor and wireless network technology but also in the application services of the diverse fields application services such as smart appliance, smart car, smart health care, etc. and the new fusion paradigm from the industry is presented by undertaking the researches in diverse area by the enterprises and research institutions. However, the smart environment exposes its weaknesses in the mobile terminal area, existing wireless network and IT security area. In addition, due to new and variant ways of attack, not only the critical information are disclosed However also the financial damages occur. This paper proposed the protocol to perform the smartphone-based safe device monitoring and safe communication. The proposed protocol designed the management procedure of registration, identification, communication protocol and device update management protocol and the safety against the attack techniques such as the an-in-the-middle-attack, impersonation attack, credential threat, information leaks and privacy invasion was analyzed. It was observed that the proposed protocol showed the performance improved by approximately 52% in the communication process than the existing system.

Design and Implementation of Protocol to Transfer Secure Messages for PDA (PDA에서 운용 가능한 보안 메시지 전송 프로토콜 설계 및 구현)

  • Lee, Ki-Young;Lee, Jeong-Kyoon
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.9 no.1
    • /
    • pp.181-187
    • /
    • 2005
  • This paper proposes and implements a service model to transfer messages safely for PDA on CDMA wireless network and a secure massage transfer protocol which considers characteristics of PDA. Proposed service uses SMS(Short Message Service) connect to a off-line client device with the wired network for data communication. After receiving SMS message, client device processes the SMS message and creates a data channel through RAS(Remote Access Service), then the data of the server can be pushed to clients. The implemented security protocol can provide safe data transmission on each communication line through two way channels(SMS and data). Also, by using security nonce table, this protocol can reduce a number of transmissions for exchanging a safe session key, so intensity of encryption can be increased.

Design of One-Time-Pad based on PKI Coordinates Technique for a Safe Key Transmission in E-Commerce Applications (전자상거래 응용에서 안전한 키 전송을 위한 PKI 좌표기법 One-Time-Pad의 설계)

  • Lee, Kil-Hun;Jun, Moon-Seok;Choi, Do-Hyeon
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.15 no.5
    • /
    • pp.51-60
    • /
    • 2015
  • As electronic commerce service became more popular, information equivalent to currency prevails in network. Accordingly, hacking into network often occurs and thus OTP (One-Time-Password) has emerged as an alternative secondary security system. However, weakness has been found in even existing One-Time Password that used to be considered 'perfect'. Therefore, it becomes very urgent to have an additional security countermeasure. As security recommendation is not considered as solution anymore, more specific plan becomes necessary. The present study proposes PKI coordinates technique-based OTP (One-Time-Pad) for a safe key transmission in E-commerce.

Research on Efficient Applicability Through Review on Standard for Selection of Construction Method for Railway Underground Crossing Transit (철도지하횡단 통과 공법 선정기준에 관한 검토를 통해 효율적인 적용성에 대한 연구)

  • Hwang, Young-Ho;Shon, Jung-Chul;Baek, Jong-Myeong
    • Proceedings of the KSR Conference
    • /
    • 2007.11a
    • /
    • pp.595-600
    • /
    • 2007
  • Greater expansion and more frequent operation of the railroad transportation system anticipated due to its characteristics including low cost, safety and mass transportation. Recently, effects on the railway structures due to expansion of newly constructed road, construction of subway, city gas pipeline, communication network, electric power network and construction of other railway underground crossing in accordance with urban planning and organization has influenced safe operation of trains. Accordingly, standard for selection of construction method that will enable construction of more economical and rational subway underground crossing structures by preventing problems occurring at the time of above construction works and accidents in safe operation of trains due to construction in advance is definitively necessary. Although there are numerous construction methods that can be applied at the time of construction of railway underground crossing, there are much difficulties in selection of appropriate construction method that considers characteristics of each construction method on non-excavation type construction method, train operation plan of number of operational routes and on-site circumstances. Therefore, this research aims to present rational standard for selection of construction method for such, and standard for slowdown speed and interception of train when passing the areas of slowdown in sectors under construction.

  • PDF

A Study on FSA Application for Human Errors of Dynamic Positioning Vessels Incidents

  • Chae, Chong-Ju
    • Journal of Navigation and Port Research
    • /
    • v.41 no.5
    • /
    • pp.259-268
    • /
    • 2017
  • Formal Safety Assessment (FSA) has been mostly implemented on the hardware aspects of vessels. Although there are guidelines regarding human error FSAs, there have not been many assessments in such areas. To this end, this study seeks to use precedent studies for the safe operation of DP vessels, conducting an FSA regarding human error of DP LOP (Loss of Position) incidents. For this, the study referred to precedent studies for the frequency of DP LOP incidents caused by human errors, adding the severity of LOP incidents, and then applying them to the Bayesian network. As a result, the study was able to confirm that among DP LOP incidents caused by human errors, the drive-off from skill-based errors was 74.3% and the drive-off from unsafe supervision was 50.5%. Based on such results, RCOs (Risk Control Options) were devised through a brainstorming session with experts coming up with proposals including providing mandatory DPO training, installing DP simulator on the vessels, drawing up measures to understanding the procedures for safe operation of DP vessels. Moreover, it was found that mandatory DPO training is reasonable in terms of cost benefits and that while installing a DP simulator is not suitable in terms of cost benefits, it can significantly reduce risks when operating DP vessels.

A New Cryptographic Algorithm for Safe Route Transversal of Data in Smart Cities using Rubik Cube

  • Chhabra, Arpit;Singhal, Niraj;Bansal, Manav;Rizvi, Syed Vilayat
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.8
    • /
    • pp.113-122
    • /
    • 2022
  • At the point when it is check out ourselves, it might track down various information in each turn or part of our lives. Truth be told, information is the new main thrust of our advanced civilization and in this every day, "information-driven" world, security is the significant angle to consider to guarantee dependability and accessibility of our organization frameworks. This paper includes a new cryptographic algorithm for safe route traversal for data of smart cities which is a contemporary, non-hash, non-straight, 3D encryption execution intended for having information securely scrambled in the interim having a subsequent theoretical layer of safety over it. Encryption generally takes an information string and creates encryption keys, which is the way to unscramble as well. In the interim in another strategy, on the off chance that one can sort out the encryption key, there are opportunities to unravel the information scrambled inside the information string. Be that as it may, in this encryption framework, the work over an encryption key (which is created naturally, henceforth no pre-assurance or uncertainty) just as the calculation produces a "state" in a way where characters are directed into the Rubik block design to disregard the information organization.

APPLICATION OF WIRELESS INCLINOMETER FOR DISPLACEMENT MEASUREMENT OF TEMPORARY EARTH RETAINING PILE

  • Chi Hun In;Hong Chul Rhim
    • International conference on construction engineering and project management
    • /
    • 2009.05a
    • /
    • pp.218-223
    • /
    • 2009
  • During the process of excavation for substructures of buildings, precise and constant measurements of retaining wall displacement is crucial for construction to be complete and safe. Currently an inclinometer is used to measure displacement around the perimeter of an excavation site. The existing inclinometer system requires an instrument to be placed inside pre-bored holes for each measurement with an typical interval of two weeks. This makes it difficult to obtain continuous displacement data, especially during a critical time such as rainy season in summer. Also, the existing inclinometer is placed at certain distance away from the retaining wall system itself. Thus, exact measurement of retaining wall movement is compromised because of the distance between the retaining wall and the inclinometer. This paper presents the development of wireless inclinometer system for the displacement measurement of retaining walls by being attached directly to the retaining wall. The result of the application of the developed systems are provided with advanced ubiquitous sensor network (USN) system features. The USN technique incorporated into the system enables users to monitor movement data from wherever possible and convenient such as construction manager's office on site or any other places connected through internet. The research work presented in this paper will provide a basis to save construction time and cost by preventing safe-related unexpected delay of construction due to the failure or collapse of retaining walls.

  • PDF

Traffic Signal Recognition System Based on Color and Time for Visually Impaired

  • P. Kamakshi
    • International Journal of Computer Science & Network Security
    • /
    • v.23 no.4
    • /
    • pp.48-54
    • /
    • 2023
  • Nowadays, a blind man finds it very difficult to cross the roads. They should be very vigilant with every step they take. To resolve this problem, Convolutional Neural Networks(CNN) is a best method to analyse the data and automate the model without intervention of human being. In this work, a traffic signal recognition system is designed using CNN for the visually impaired. To provide a safe walking environment, a voice message is given according to light state and timer state at that instance. The developed model consists of two phases, in the first phase the CNN model is trained to classify different images captured from traffic signals. Common Objects in Context (COCO) labelled dataset is used, which includes images of different classes like traffic lights, bicycles, cars etc. The traffic light object will be detected using this labelled dataset with help of object detection model. The CNN model detects the color of the traffic light and timer displayed on the traffic image. In the second phase, from the detected color of the light and timer value a text message is generated and sent to the text-to-speech conversion model to make voice guidance for the blind person. The developed traffic light recognition model recognizes traffic light color and countdown timer displayed on the signal for safe signal crossing. The countdown timer displayed on the signal was not considered in existing models which is very useful. The proposed model has given accurate results in different scenarios when compared to other models.

Efficient Sensor Data Compression Algorithm for Data-Centric Storage (데이터 중심 저장 기법을 위한 효율적인 센서 데이터 압축 기법)

  • Roh, Kyu-Jong;Yeo, Myung-Ho;Seong, Dong-Ook;Bok, Kyoung-Soo;Shin, Jae-Ryong;Yoo, Jae-Soo
    • The Journal of the Korea Contents Association
    • /
    • v.10 no.11
    • /
    • pp.58-67
    • /
    • 2010
  • Data-centric storage schemes(DCS) are one of representative researches that efficiently store and manage sensor readings in sensor nodes in the sensor networks. In DCS, a sensor sends the sensed data to a specific node in order to store them. However, it has a problem that sensor nodes consume a lot of energy for transmitting their readings to remote sensor node. In this paper, we propose a novel sensor data compression algorithm to reduce communication costs for DCS. The proposed algorithm establishes a safe region and transmits the sensed data only when current measurement is out of the safe region, As a result, the proposed algorithm extends network life time and reduces data transmission. It is shown through performance evaluation that our proposed algorithm reduces energy consumption by about 60% over the conventional algorithm.