• Title/Summary/Keyword: Security Enhancement

Search Result 354, Processing Time 0.029 seconds

Implement pattern lock security enhancement using thread to measure input time (입력시간을 측정하는 쓰레드를 활용한 패턴 잠금 보안 강화 구현)

  • An, Kyuhwang;Kwon, Hyeokdong;Kim, Kyungho;Seo, Hwajeong
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.23 no.4
    • /
    • pp.470-476
    • /
    • 2019
  • The pattern locking technique applied to smart phones is a locking technique that many people use conveniently. However, the safety of pattern locking techniques is very low compared with other techniques. The pattern locking technique is vulnerable to a shoulder surfing attack, which is based on the user's input and can be interpreted by looking at the movement of the shoulder, and the smudge attack is also vulnerable due to fingerprint drag marks remaining on the mobile phone pad. Therefore, in this paper, we want to add a new security method to check the pressed time by using a thread in the pattern locking scheme to secure the vulnerability. It is divided into short, middle, and long click according to the pressing time at each point. When dragging using the technique, security performance enhances $3^n$ tiems. Therefore, even if dragging in the same 'ㄱ' manner, it becomes a completely different pattern depending on the pressing time at each point.

Performance Enhancement Scheme for RR Protocol in MIPv6 (MIPv6에서 RR프로토콜 성능개선 방안)

  • 이달원;황일선;손승원;조인준
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.14 no.5
    • /
    • pp.49-56
    • /
    • 2004
  • An Internet draft, named RR(Return Routability) protocol, proposed to IETF mobileip WG, in order to establish an optimal path to MN(Mobile Node) by securely sending the BU(Binding Update) message to CN(Correspondent Node). However, it has some problems with initiating the protocol by the MN: it causes to increases in communication load in the home network, to increases communication delay between MN and CN, and increases in communication load due to unnecessary message exchanges. To resolve the problems, this paper proposes an alternative scheme for the RR protocol in MIPv6. The proposed scheme is devised to start the protocol by HA on receiving the first packet from CN. It decreases the route optimization overhead by reducing the number of BU messages as well as the communication time. Beside these advantages, this scheme provides the same security grade as the original RR protocol.

Self-Sovereign Identity Management: A Comparative Study and Technical Enhancements

  • Noot A. Alissa;Waleed A. Alrodhan
    • International Journal of Computer Science & Network Security
    • /
    • v.23 no.12
    • /
    • pp.27-80
    • /
    • 2023
  • Nowadays usage of different applications of identity management IDM demands prime attention to clarify which is more efficient regarding preserve privacy as well as security to perform different operations concerning digital identity. Those operations represent the available interactions with identity during its lifecycle in the digital world e.g., create, update, delete, verify and so on. With the rapid growth in technology, this field has been evolving with a number of IDM models being proposed to ensure that identity lifecycle and face some significant issues. However, the control and ownership of data remines in the hand of identity service providers for central and federated approaches unlike in the self-sovereign identity management SSIM approach. SSIM is the recent IDM model were introduced to solve the issue regarding ownership of identity and storing the associated data of it. Thus, SSIM aims to grant the individual's ability to govern their identities without intervening administrative authorities or approval of any authority. Recently, we noticed that numerous IDM solutions enable individuals to own and control their identities in order to adapt with SSIM model. Therefore, we intend to make comparative study as much of these solutions that have proper technical documentation, reports, or whitepapers as well as provide an overview of IDM models. We will point out the existing research gaps and how this study will bridge it. Finally, the study will propose a technical enhancement, everKEY solution, to address some significant drawbacks in current SSIM solutions.

An Effective Intrusion Detection System for MobileAdHocNetwork (모바일 에드혹네트워크를 위한 효과적인 침입 탐지 시스템)

  • Shrestha, Rakesh;Park, Kyu-Jin;Park, Kwang-Chae;Choi, Dong-You;Han, Seung-Jo
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2008.05a
    • /
    • pp.271-276
    • /
    • 2008
  • The intrusion detection system is one of the active fields of research in wireless networks. Intrusion detection in wireless mobile Ad hoc network is challenging because the network topologies is dynamic, lack centralization and are vulnerable to attacks. This paper is about the effective enhancement of the IDS technique that is being implemented in the mobile ad hoc network and deals with security and vulnerabilities issues which results in the better performance and detection of the intrusion.

  • PDF

A Study on the Floor Plan Characteristics of Component Schools in Small Schools Complexes -by Analyzing Spatial Structures of School Facilities in Foreign Countries- (집합형 소규모 학교의 단위학교 평면구성 특성에 관한 연구 -외국학교 사례의 공간구성 분석을 통하여-)

  • Kweon, Ji-Hoon
    • Journal of the Korean Institute of Educational Facilities
    • /
    • v.14 no.4
    • /
    • pp.86-95
    • /
    • 2007
  • This study clarifies the theoretical background and the floor plan characteristics of component schools in Small Schools Complexes. The recent researches have proved the enhancement of students' social relationship and school security in the new school environment. The findings fur the characteristics by analyzing the component schools from six school complexes follow: (1) Students can access their classrooms in component schools through main entrances, shared corridors and private corridors. (2) Teachers' area is segregated from students' area, which does not encourage the social relationship between teachers and students. (3) Some of special classrooms, which are generally considered as shared facilities in a Small Schools Complex, are planned within component schools for accommodating specialized educational programs. (4) A component school occupying multiple floors reduces Intelligibility of space and chances of users' visual contact to colleagues. Finally, this study proposed the alternative floor planning directions in order to improve users' social relationship in a component school.

A Study on the Fingerprint Recognition Algorithm Using Enhancement Method of Fingerprint Ridge Structure

  • Jung, Yong-Hoon;Roh, Jeong-Serk;Rhee, Sang-Burm
    • 제어로봇시스템학회:학술대회논문집
    • /
    • 2003.10a
    • /
    • pp.1788-1793
    • /
    • 2003
  • The present of state is situation that is realized by necessity of maintenance of public security about great many information is real condition been increasing continually in knowledge info-age been situating in wide field of national defense, public peace, banking, politics, education etc. Also, loss or forgetfulness, and peculation by ID for individual information and number increase of password in Internet called that is sea of information is resulting various social problem. By alternative about these problem, including Biometrics, several authentication systems through sign(Signature), Smart Card, Watermarking technology are developed. Therefore, This paper shows that extract factor that efficiency can get into peculiar feature in physical features for good fingerprint recognition algorithm implementation with old study finding that take advantage of special quality of these fingerprint.

  • PDF

Power system security monitoring and enhancement of KPX's next control center (전력거래소 차기 EMS 전력계통 안전도 감시 및 개선 기능)

  • Hur, Seong-Il;Kang, Hyung-Goo;Seo, Eun-Sung;Lee, Jin-Soo;Lee, Keun-Woong
    • Proceedings of the KIEE Conference
    • /
    • 2011.07a
    • /
    • pp.382-383
    • /
    • 2011
  • 전력거래소는 본사이전 및 신규 급전소신설과 기존 시스템의 한계수명 도달에 대비하여 현재 운용중인 전력IT 시스템을 새롭게 구축할 예정이다. 전력거래소 차기 전력IT 시스템은 안정하고 공정한 전력계통 및 전력시장 운영을 지원하기 위해 계통운영시스템(EMS), 시장운영시스템(MOS) 그리고 전력IT 기반설비로 구성된다. 본 논문에서는 전력계통의 감시 및 제어를 위한 계통운영시스템 그중에서도 전력계통의 안전도 감시 기능과 안전도 개선 기능에 대해 소개하고자 한다.

  • PDF

Enhancement of Interface Flow Limit using Static Synchronous Series Compensator(SSSC) (SSSC 투입에 따른 연계선로의 송전운용한계 개선)

  • Kim, Seul-Ki;Song, Hwa-Chang;Lee, Byong-Jun;Kwon, Sae-Hyuk;Chang, Byung-Hoon
    • Proceedings of the KIEE Conference
    • /
    • 2000.07a
    • /
    • pp.28-30
    • /
    • 2000
  • This paper introduces a power flow model of SSSC for voltage stability study. The SSSC model is obtained from the injection model of voltage source inverter by adding the condition that SSSC injection voltage is in quadrature with current of SSSC-installed branch. This model is incorporated into modified CPF algorithm to study effects of SSSC on the security-constrained interface flow limit. Determination of interface flow limit is simply briefed. In case study a 771-bus real system is used to show that SSSC can improve interface flow limit in terms of voltage stability.

  • PDF

Design of Policy control system for Security enhancement of the Windows Systems (윈도우즈 시스템의 보안 강화를 위한 정책 제어 시스템 설계)

  • Park, Jung-Jin;Park, Jin-Sub;Lee, Seung-Hyeok;Baek, Seung-Duk
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2007.10d
    • /
    • pp.155-159
    • /
    • 2007
  • 인터넷 및 네트워크의 사용이 일반화됨으로써 컴퓨터 시스템을 사용하지 않는 분야 및 사용자가 없을 정도이다. 컴퓨터 시스템을 사용함에 있어 순기능이 있는 반면 이에 대한 역기능 또한 급속하게 증가하고 있다. 역기능 중 가장 심각한 문제를 발생시킬 수 있는 부분이 웜 및 바이러스, 또한 악의적인 목적이 해킹 등이 있다. 이러한 문제를 해결하기 위해 각종 보안시스템 및 소프트웨어를 도입하여 사용하고 있지만 이에 앞서 일반적으로 사용하는 윈도우즈 시스템 자체에 포함되어 있는 각종 보안 설정을 통하여 근본적인 원인을 해결할 수 있다면 악의적인 목적에 의한 피해는 미연에 방지할 수 있을 것이다. 본 논문에서는 이러한 윈도우즈 시스템 자체에 있는 보안설정 기능을 자동으로 설정 및 제어할 수 있는 시스템을 제안하고자 한다.

  • PDF

A Study on the Current Operation and Activation of Online Alternative Dispute Resolution (온라인 ADR의 운영현황과 활성화 방안에 관한 연구)

  • Choi, Seok-Beom
    • Journal of Arbitration Studies
    • /
    • v.18 no.3
    • /
    • pp.91-116
    • /
    • 2008
  • E-Commerce constitutes an important part of all commercial activities. Online Alternative Dispute Resolution(Online ADR) or Online Dispute Resolution(ODR) is a new method of dispute, resolution which, is provided online. Most Online ADR services are alternatives to litigation. In this respect, they are the online transposition of the methods developed in the ADR movement such as negotiation, mediation and arbitration. But there are also online courts which are really normal courts in which the contesting parties communicate essentially online. This paper deals with the current operation of Online ADR and the ways to, activate it. They include (1) die establishment of legal stability regarding Online ADR, (2) the enhancement of system security in providing Online ADR services, (3) the introduction of Online ADR service platform for providing the various services through single window on a national, or global basis, and (4) the introduction of Online ADR online monitoring system for systematic dispute resolution services.

  • PDF