• Title/Summary/Keyword: Security Enhancement

Search Result 354, Processing Time 0.024 seconds

Security Enhancement of Biometrics-based Remote User Authentication Scheme Using Smart Cards (스마트 카드를 이용한 생체인식 기반 원격 사용자 인증 스킴의 보안성 개선)

  • An, Young-Hwa;Joo, Young-Do
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.12 no.1
    • /
    • pp.231-237
    • /
    • 2012
  • In 2011, Das proposed an effective biometrics-based remote user authentication scheme using smart cards that can provide strong authentication and mutual authentication, while eliminating the security drawbacks of Li-Hwang's scheme. In this paper, we have shown that Das's scheme is still insecure against several attacks and does not provide mutual authentication. Also, we proposed the enhanced scheme to overcome these security weaknesses, even if the secret information stored in the smart card is revealed. As a result of security analysis, the enhanced scheme is secure against user impersonation attack, server masquerading attack, off-line password guessing attack, and insider attack. And we can see that the enhanced scheme provides mutual authentication between the user and the server.

Comparative Study of DC Breakdown and Space Charge Characteristics of Insulation Paper Impregnated with Natural Ester and Mineral Oil

  • Hao, Jian;Zou, Run-Hao;Liao, Rui-Jin;Yang, Li-Jun;Liao, Qiang;Zhu, Meng-Zhao
    • Journal of Electrical Engineering and Technology
    • /
    • v.13 no.4
    • /
    • pp.1682-1691
    • /
    • 2018
  • Natural ester is a suitable substitute for mineral oil and has been widely used in AC transformer in many countries. In order to further application of natural ester in direct current (DC) equipment, it is needed to investigate its long term insulation property under DC condition. In this paper, a thermal ageing experiment was conducted for both mineral oil-paper and natural ester-paper insulation. The DC breakdown and space charge characteristics of insulation paper impregnated with natural ester and mineral oil was compared. Results show that the resistivity of the paper immersed in natural ester and mineral oil both increase as the ageing goes on. While insulation paper impregnated with natural ester has higher resistivity and DC breakdown voltage than the paper impregnated with mineral oil. The DC breakdown voltage for the oil impregnated insulation paper being DC pre-stressing is higher than that without pre-stressing. The average DC breakdown field strength difference between the test with pre-stressing and without pre-stressing clearly shows that there is an apparent enhancement effect for the homo-charge injection on the DC breakdown.

A Conceptual Study on Outsourcing Strategy in Betel Industry (관광호텔 아웃소싱 전략에 관한 개념적 고찰)

  • 정연홍;하용규
    • Culinary science and hospitality research
    • /
    • v.8 no.3
    • /
    • pp.123-146
    • /
    • 2002
  • Outsourcing is procuring of outside resources, other than core resources for core competence, by a contract, from which a corporate can focus its core resources on core business. The outsourcing strategies of Korea tourist hotel business are in a rudimentary stage, which has been limited in simple work areas such as housekeeping services, room maid services, parking control services, security services, janitor services, laundry services, facility management, shuttle bus services, and sterilization services and their purposes are mainly to retrench a burden of employment or firm-fixed expenses. Therefore, the outsourcing strategies of Korea tourist hotel business have the following problems. First, their outsourcing has introduced only for the purpose of retrenching expenses. Second, it tends to deteriorate service quality, due to lack of pre-training. Third, it tends to concentrate their attentions only on simple repetition works. Fourth, their outsourcing is slow adjusted to the needs of business cultures. Outsourcing services in Korea tourist hotel business have never contributed to their basic concepts such as 1) maintenance or enhancement of core competences, 2) promotion of business efficiency through service quality improvement and expense retrenchment, and 3) achievement or enhancement of competitive advantage through enlarging their specialties, cultivating their market, learning new knowledge, and developing their asset. Therefore, this study is to insist on fife necessity of overcoming simple repetitive service outsourcing in tourist hotel business. In order to build a core competence and/or achieve a competitive advantage, the scopes of outsourcing services should be enlarged in Korea tourist hotel business.

  • PDF

Enhancement technology for unwanted emission of logistics tracking device (물류트랙킹 장비의 전자파불요방사 개선 기술)

  • Lee, Eun-Kyu;Choi, Sung-Pill;Moon, Young-Sik;Jeon, Mi-Jin;Jo, Jae-Hui;Kim, Jae-Joong;Choi, Hyung-Rim
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2013.10a
    • /
    • pp.898-899
    • /
    • 2013
  • In recent years, logistics tracking Device using to improve logistics efficiency are being extensively researched. The purpose of this paper is to Enhancement technology for unwanted emission of logistics tracking device usable cargo container security transport.

  • PDF

Optimal Placement of Phasor Measurement Unit for Observation Reliability Enhancement

  • TRAN, Van-Khoi;ZHANG, He-sheng;NGUYEN, Van-Nghia
    • Journal of Electrical Engineering and Technology
    • /
    • v.12 no.3
    • /
    • pp.996-1006
    • /
    • 2017
  • Phasor Measurement Unit (PMU) placement is a crucial problem for State Estimation (SE) of the power system, which can ensure that the power network is fully observed. Further, the observation reliability problem of the system has been concerned in the operation conditions. In this paper, based on modified weighted adjacent matrix ($A_w$), an optimal placement method is proposed to solve simultaneously two problems involving the optimal PMU placement problem and the observation reliability enhancement problem of the system. The purpose of the proposed method is to achieve both the minimum total cost and the maximum observation reliability, with a focus on increasing the security of observability, strengthening the observation reliability of buses as well as enhancing the effectiveness of redundancy. Simulations on IEEE 14, 24, 30 and 57 bus test systems are presented to justify the methodology. The results of this study show that the proposed method is not only ensuring the power network having the observability effectively but also enhancing significantly the observation reliability. Therefore, it can be a useful tool for SE of the power system.

Research on Measures to Enhance Railroad Security Checks of Railroad Police Officers to Prevent Terrorist Attacks (철도테러 예방을 위한 철도경찰 보안검색 강화 방안 연구)

  • Gwon, Hyeon-Shik
    • Korean Security Journal
    • /
    • no.49
    • /
    • pp.157-183
    • /
    • 2016
  • Countries across the globe, including those in Europe, are waging a "war against terrorism" as international terrorist groups such as ISIS and lone-wolf terrorists have unleashed various large-scale attacks on rail infrastructure. Anti-South Korean sentiment exists in Muslim-majority countries because the nation has cooperated with the US for its military interventions in the Middle East, and ISIS has threatened to target South Korea four times since September 9, 2015. In addition, North Korea has been left isolated in the international community with its missile and nuclear tests, while further escalating inter-Korean tension and threatening to strike major facilities and attack important figures in the South. These situations imply that South Korea is no longer immune to terrorist attacks. If the nation fails to prevent or deter such terrorist attacks against rail networks, massive casualties, property damage and social confusion would be unavoidable, deteriorating national and international trust in its counter-terrorism policies. This may lead to a national crisis involving decreases in the number of tourists, dampened interest of foreign investors, and capital flight. This study aims to propose policy measures to enhance railroad security checks, based on the work of railroad police officers, for the sake of protecting citizens and public safety. The suggestions include an incremental expansion of railroad security checks; growth of the railroad police force and adjustment of their policing distribution with other police officers; enhancement of security systems across important rail networks; improvement of the Railroad Safety Act; Southeast Asia, including the corresponding strengthening of the national crackdown illegal immigrants, and plans for pre-emptive and regular cooperation among organizations related to the promotion of security checks and the prevention of terrorist attacks.

  • PDF

"An Analysis Study of Factors for Strengthening Cybersecurity at the Busan Port Container Terminal (부산항 컨테이너 터미널 사이버 보안 강화를 위한 요인 분석연구)

  • Do-Yeon Ha;Yul-Seong Kim
    • Proceedings of the Korean Institute of Navigation and Port Research Conference
    • /
    • 2023.11a
    • /
    • pp.64-65
    • /
    • 2023
  • The purpose of this study was to assess the current status of cyber security at the Busan Port container terminal and derive strengthening factors through exploratory research. In recent years, the maritime industry has actively adopted Fourth Industrial Revolution technologies, resulting in changes in the form of ports, such as automated and smart terminals. While these changes have brought positive improvements in port efficiency, they have also increased the potential for cyber security incidents and threats, including information leakage through cargo handling equipment and ransomware attacks leading to terminal operations disruption. Especially in the case of ports, cyber security threats can have not only local effects within the port but also physical damage and implications for national security. However, despite the growing cyber security threats within ports, research related to domestic port cyber security remains limited. Therefore, this study aimed to identify factors for enhancing cyber security in ports and derive future enhancement strategies. The study conducted an analysis focusing on the Busan Port container terminal, which is one of the leading ports in South Korea actively adopting Fourth Industrial Revolution technologies, and conducted a survey of stakeholders in the Busan Port container terminal. Subsequently, exploratory factor analysis was used to derive strengthening factors. This study holds significance in providing directions for enhancing cyber security in domestic container ports in the future.

  • PDF

An Integrated Approach for Korea's e-Navigation Development Project to Playing the Global Lead in Maritime Safety Logistics of IMO's Next Generation (한국의 이네비게이션개발사업이 IMO차세대 해사안전보안물류상 세계 주역을 맡기 위한 통합적 접근)

  • Gim, Jin-Goo
    • Proceedings of the Korean Institute of Navigation and Port Research Conference
    • /
    • 2016.05a
    • /
    • pp.58-58
    • /
    • 2016
  • This study aims to enhance Korea's competitiveness by taking the lead in the international standardization and relevant global market. This is to be achieved by performing the role of First Mover through the resolute investment from Fast Follower that is servile to the decision of the organization in the e-Navigation strategy that has been promoted by the IMO. The study methodology is an integrated approach. It is established by modelling LSCM G2B2C2 Platform in maritime safety/security logistics and applied to the enhancement of maritime safety/security in global LSCM. This paper externally contributes to the reduction of world maritime accidents and exalt the national prestige; internally, the enhancement of the national competitiveness through the improvement of shipping port logistics and others. These eventually contribute to Korea's economic development that is combined by both theory and practice and of practical use of the integrated approach.

  • PDF

A Hybrid K-anonymity Data Relocation Technique for Privacy Preserved Data Mining in Cloud Computing

  • S.Aldeen, Yousra Abdul Alsahib;Salleh, Mazleena
    • Journal of Internet Computing and Services
    • /
    • v.17 no.5
    • /
    • pp.51-58
    • /
    • 2016
  • The unprecedented power of cloud computing (CC) that enables free sharing of confidential data records for further analysis and mining has prompted various security threats. Thus, supreme cyberspace security and mitigation against adversaries attack during data mining became inevitable. So, privacy preserving data mining is emerged as a precise and efficient solution, where various algorithms are developed to anonymize the data to be mined. Despite the wide use of generalized K-anonymizing approach its protection and truthfulness potency remains limited to tiny output space with unacceptable utility loss. By combining L-diversity and (${\alpha}$,k)-anonymity, we proposed a hybrid K-anonymity data relocation algorithm to surmount such limitation. The data relocation being a tradeoff between trustfulness and utility acted as a control input parameter. The performance of each K-anonymity's iteration is measured for data relocation. Data rows are changed into small groups of indistinguishable tuples to create anonymizations of finer granularity with assured privacy standard. Experimental results demonstrated considerable utility enhancement for relatively small number of group relocations.

The Etrance Authentication Systems Using Real-Time Object Extraction and the RFID Tag (얼굴 인식과 RFID를 이용한 실시간 객체 추적 및 인증 시스템)

  • Jung, Young Hoon;Lee, Chang Soo;Lee, Kwang Hyung;Jun, Moon Seog
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.4 no.4
    • /
    • pp.51-62
    • /
    • 2008
  • In this paper, the proposal system can achieve the more safety of RFID System with the 2-step authentication procedures for the enhancement about the security of general RFID systems. After authentication RFID Tag, additionally, the proposal system extract the characteristic information in the user image for acquisition of the additional authentication information of the user with the camera. In this paper, the system which was proposed more enforce the security of the automatic entrance and exit authentication system with the cognitive characters of RFID Tag and the extracted characteristic information of the user image through the camera. The RFID system which use the active tag and reader with 2.4GHz bandwidth can recognize the tag of RFID in the various output manner. Additionally, when the RFID system have errors, the characteristic information of the user image is designed to replace the RFID system as it compare with the similarity of the color, outline and input image information which was recorded to the database previously. In the result of experiment, the system can acquire more exact results as compared with the single authentication system when it using RFID Tag and the information of color characteristics.