• Title/Summary/Keyword: Security Mechanisms

Search Result 393, Processing Time 0.03 seconds

A Study on the Policy Trends for the Revitalization of Medical Big Data Industry (의료 빅데이터 산업 활성화를 위한 정책 동향 고찰)

  • Kim, Hyejin;Yi, Myongho
    • Journal of Digital Convergence
    • /
    • v.18 no.4
    • /
    • pp.325-340
    • /
    • 2020
  • Today's rapidly developing health technology is accumulating vast amounts of data through medical devices based on the Internet of Things in addition to data generated in hospitals. The collected data is a raw material that can create a variety of values, but our society lacks legal and institutional mechanisms to support medical Big Data. Therefore, in this study, we looked at four major factors that hinder the use of medical Big Data to find ways to enhance use of the Big Data based healthcare industry, and also derived implications for expanding domestic medical Big Data by identifying foreign policies and technological trends. As a result of the study, it was concluded that it is necessary to improve the regulatory system that satisfies the security and usability of healthcare Big Data as well as establish Big Data governance. For this, it is proposed to refer to the Big Data De-identification Guidelines adopted by the United States and the United Kingdom to reorganize the regulatory system. In the future, it is expected that it will be necessary to have a study that has measures of the conclusions and implications of this study and to supplement the institutional needs to play a positive role in the use of medical Big Data.

Distributed Key Management Using Regression Model for Hierarchical Mobile Sensor Networks (계층적인 이동 센서 네트워크에서 회귀모델을 이용한 분산 키 관리)

  • Kim Mi-Hui;Chae Ki-Joon
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.43 no.7 s.349
    • /
    • pp.1-13
    • /
    • 2006
  • In this paper, we introduce a novel key management scheme that is based on the key pre-distribution but provides the key re-distribution method, in order to manage keys for message encryption and authentication of lower-layer sensor nodes on hierarchical mobile sensor networks. The characteristics of our key management are as follows: First, the role of key management is distributed to aggregator nodes as well as a sink node, to overcome the weakness of centralized management. Second, a sink node generates keys using regression model, thus it stores only the information for calculating the keys using the key information received from nodes, but does not store the relationship between a node and a key, and the keys themselves. As the disadvantage of existing key pre-distributions, they do not support the key re-distribution after the deployment of nodes, and it is hard to extend the key information in the case that sensor nodes in the network enlarge. Thirdly, our mechanism provides the resilience to node capture(${\lambda}$-security), also provided by the existing key pre-distributions, and fourth offers the key freshness through key re-distribution, key distribution to mobile nodes, and scalability to make up for the weak points in the existing key pre-distributions. Fifth, our mechanism does not fix the relationship between a node and a key, thus supports the anonymity and untraceability of mobile nodes. Lastly, we compare ours with existing mechanisms, and verify our performance through the overhead analysis of communication, computation, and memory.

Method of Detecting and Isolating an Attacker Node that Falsified AODV Routing Information in Ad-hoc Sensor Network (애드혹 센서 네트워크에서 AODV 라우팅 정보변조 공격노드 탐지 및 추출기법)

  • Lee, Jae-Hyun;Kim, Jin-Hee;Kwon, Kyung-Hee
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.12 no.12
    • /
    • pp.2293-2300
    • /
    • 2008
  • In ad-hoc sensor network, AODV routing information is disclosed to other nodes because AODV protocol doesn't have any security mechanisms. The problem of AODV is that an attacker can falsify the routing information in RREQ packet. If an attacker broadcasts the falsified packet, other nodes will update routing table based on the falsified one so that the path passing through the attacker itself can be considered as a shortest path. In this paper, we design the routing-information-spoofing attack such as falsifying source sequence number and hop count fields in RREQ packet. And we suggest an efficient scheme for detecting the attackers and isolating those nodes from the network without extra security modules. The proposed scheme doesn't employ cryptographic algorithm and authentication to reduce network overhead. We used NS-2 simulation to evaluate the network performance. And we analyzed the simulation results on three cases such as an existing normal AODV, AODV under the attack and proposed AODV. Simulation results using NS2 show that the AODV using proposed scheme can protect the routing-information-spoofing attack and the total n umber of received packets for destination node is almost same as the existing norm at AODV.

Assessment of Perspective Development of Transport and Logistics Systems at Macro and Micro Level under the Conditions of Industry 4.0 Integration

  • Maiboroda, Olha;Bezuhla, Liudmyla S.;Gukaliuk, Andrii F.;Shymanska, Viktoriia;Momont, Tetiana;Ilchenko, Tetiana V.
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.3
    • /
    • pp.235-244
    • /
    • 2021
  • The change of the development of transport and logistics systems occurs with the active change of technology and the advent of the era of Industry 4.0. It requires modernization of approaches to the development of transport and logistics systems at the macro and micro levels. The present study aims to identify perspective directions of development and evolution, find out the existing obstacles in the integration of technological solutions of transport and logistics systems at the macro and micro levels. This study is based on a quantitative and qualitative methodology for assessing the level of integration of technologies into transport and logistics systems to study the prospects for their development at the micro level. Macroeconomic indicators of transport and logistics in the context of different regions of the world were used to quantify the development prospects. For a qualitative assessment of the development of the transport and logistics system, the case study method was used. The object of the study was selected logistics company Sensco Logistics Inc., Austin TX. At the macro level, countries with more innovative logistics sectors have stronger mechanisms for coordinating private sector activities. Simplification of administrative procedures of control and regulation by the public sector in order to facilitate trade between countries is a promising direction for the development of transport and logistics systems. Such reforms are more effective in developing a "rigid" transport infrastructure. The integration of Industry 4.0 technology solutions into the international logistics sector is defined by political and legal barriers, especially in developing countries. In low-income countries, hard and soft infrastructure reforms are hindering the development of logistics companies that provide transport services. This determines the national level of development of transport and logistics systems, and in general the global level of development of transport and logistics. In developed countries, the legal barriers to the development of new technological logistics are environmental requirements for the integration of technologies into the transport system. These trends are slowing down the development of International Logistics, which, compared to other industries, is slower to integrate Industry 4.0 technologies. This study combines macroeconomic factors that determine the prospects for the development of transport and logistics systems at the micro level.

Modern Paradigm of Organization of the Management Mechanism by Innovative Development in Higher Education Institutions

  • Kubitsky, Serhii;Domina, Viktoriia;Mykhalchenko, Nataliia;Terenko, Olena;Mironets, Liudmyla;Kanishevska, Lyubov;Marszałek, Lidia
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.11
    • /
    • pp.141-148
    • /
    • 2022
  • The development of the education system and the labor market today requires new conditions for unification and functioning, the introduction of an innovative culture in the field of Education. The construction of modern management of innovative development of a higher education institution requires consideration of the existing theoretical, methodological and practical planes on which its formation is based. The purpose of the article is to substantiate the modern paradigm of organizing the mechanism of managing the innovative development of higher education institutions. Innovation in education is represented not only by the final product of applying novelty in educational and managerial processes in order to qualitatively improve the subject and objects of management and obtain economic, social, scientific, technical, environmental and other effects, but also by the procedure for their constant updating. The classification of innovations in education is presented. Despite the positive developments in the development of Education, numerous problems remain in this area, which is discussed in the article. The concept of innovative development of higher education institutions is described, which defines the prerequisites, goals, principles, tasks and mechanisms of university development for a long-term period and should be based on the following principles: scientific, flexible, efficient and comprehensive. The role of the motivational component of the mechanism of innovative development of higher education institutions is clarified, which allows at the strategic level to create an innovative culture and motivation of innovative activity of each individual, to make a choice of rational directions for solving problems, at the tactical level - to form motives for innovative activity in the most effective directions, at the operational level - to monitor the formation of a system of motives and incentives, to adjust the directions of motivation. The necessity of the functional component of the mechanism, which consists in determining a set of steps and management decisions aimed at achieving certain goals of innovative development of higher education institutions, is proved. The monitoring component of the mechanism is aimed at developing a special system for collecting, processing, storing and distributing information about the stages of development of higher education institutions, prediction based on the objective data on the dynamics and main trends of its development, and elaboration of recommendations.

Network Architecture and Fast Vertical Handover Scheme for UMTS-WLAN Interworking (UMTS-WLAN 간 빠른 수직적 핸드오버 제공을 위한 연동망 모델 및 핸드오버 방식)

  • Kim, In-Cheol;Lee, Sung-Kuen;Kim, Eal-Lae;Park, Jin-Woo
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.32 no.8B
    • /
    • pp.492-501
    • /
    • 2007
  • UMTS-WLAN interworking approach can make the best use of the advantages of both networks by eliminating the stand-alone defects of the two services. For the interworking mechanisms of WLANs and UMTS networks, two major solutions have been proposed, namely loose coupling and tight coupling. The loose coupling approach provides separate data paths for WLAN and UMTS. On the other hand, the tight coupling provides a full integration of the WLAN network and the UMTS core network. The loose coupling has been preferred due to the simplicity and less reconfiguration requirement. However, loose coupling is worse in seamless mobility, QoS provision, and network security. In order to lessen the problems involved in the UMTS-WLAN interworking approaches, we propose a new interworking network architecture and a fast vertical handover scheme by employing Mobility Anchor(MA) for interworking between the two different networks. MA can enable authentication and session initialization before L2 handover of the mobile terminal, so that the seamless and fast vertical handover become possible. Thru analysis and numerical experiments, we proved that the proposed scheme has been validated.

Implementation of a Secure Wireless LAU System using AP Authentication and Dynamic Key Exchange (AP 인증 및 동적 키 분배를 이용한 안전한 무선랜 시스템 구현)

  • Lee, Jong-Hu;Lee, Myung-Sun;Ryou, Jae-Cheol
    • The KIPS Transactions:PartC
    • /
    • v.11C no.4
    • /
    • pp.497-508
    • /
    • 2004
  • The existing wireless LAN standard IEEE802.11b has many vulnerabilities from security point of view. The authentication mechanisms in IEEE802.11b have many vulnerabilities. As a result to complement the weak of IEEE802.11b authentication, the IEEE802.1x had been developed in the sense of providing strong user authentication with appropriate mechanism. But this mechanism does not perform AP authentication and there are also some weak points. And in confidentiality and message Integrity case, WEP is weak from key stream reuse attack, IV reuse attack and so on. For that reason, in this paper we propose secure wireless LAN system. Our system provides strong user authentication, confidentiality, and message integrity based on existing IEEE802.1x framework and TLS.

A Design of Advanced Channel Creation in e-Passport (전자여권의 향상된 채널생성 기법 설계)

  • Lee, Gi-Sung;Jeon, Sang-Yeob;Jun, Moon-Seog
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.13 no.10
    • /
    • pp.4814-4821
    • /
    • 2012
  • An e-passport is equipped with bio information by adding the non-attachable IC chip with a smart function. In order to solve such a problem, the user's privacy is protected by using the BAC, PA, AA and EAC mechanisms. However, the password key used in the BAC mechanism is made of the combination of the MRZ values. As a result, it is possible to decode the password by using the indiscriminate attacking program after finding out the combined rules of MRZ. This thesis suggests the mechanism with an improved level of efficiency through the time-stamp values by using the information of images and fingerprints and checking the forge or falsification of the e-passport when establishing a safe channel between the chip of the e-passport and the decoding system.

A Study on the Application of International Law through Disputes Settlement in Northeast Asia Fishing Ground (동북아 어장에서의 어업분쟁 해결 사례를 통한 국제법 적용 방안)

  • Lee, Woo-Do;Kim, Nam-Soo;Lee, Jin-Soo
    • The Journal of Fisheries Business Administration
    • /
    • v.48 no.3
    • /
    • pp.15-32
    • /
    • 2017
  • This article's aim is to review the jurisprudence which has emerged pursuant to the international dispute settlement provisions and to provide a provisional expectation as to the future of international dispute settlement under "UNCLOS". Globally, marine fisheries play an important role in ocean biodiversity and the food security of millions of people, providing a vital source of high-quality dietary protein and supporting individuals' livelihoods and income. In the 1982 Convention, the establishment of co-operative mechanisms for effective monitoring, control, surveillance and enforcement, decision-making procedures facilitating the adoption of such measures of conservation and management, and the promotion of the peaceful settlement of disputes are called for. In this study, 'Northeast Asian Sea' means that the Yellow/East China Sea, the East Sea, the Ohotsk Sea, the Kamchaka Sea, the Alaska Sea, and the Bering Sea surrounded by Korea, China, Japan, Russia, U.S.A. and Canada including their EEZs. There are several bilateral fisheries agreements existing in Northeast Asian area, the Fisheries Agreement between Republic Korea and Japan, between Republic of Korea and China, between China and Japan, between Republic Korea and U.S.A., between Republic Korea and Russia, between Russia and Japan, And there are several regional fisheries organizations existing in Northeast Asian area, for example NPAFC(Convention for the Conservation of Anadromous Stocks in the North Pacific Ocean), CBSPC (Convention on the Central Bering Sea Pollack Conservation), PICES(North Pacific Marine Science Organization), NPFC(North Pacific Fishery Commi-ssion) etc. It analyzed the proliferation of bilateral treaties and multilateral treaties due to the adoption of the EEZ in Northeast Asia reviewed the strengthening of management rights on the high seas marine living resources and marine environment preservation of regional fisheries organizations. In view of the changes in the international fisheries mechanism this paper suggested the future direction of the country in overseas fisheries. We concluded as follows. We shall apply bilateral treaties first, regional fisheries organizations' treaties secondly, and provisions under "UNCLOS" for dispute settlement last.

Insider Trading on Nonpublic Information and Shareholders' Wealth (비공개정보(非公開情報)를 이용한 내부자거래(內部者去來)와 주주(株主)의 부(富))

  • Kim, Wi-Saeng
    • The Korean Journal of Financial Management
    • /
    • v.8 no.1
    • /
    • pp.139-153
    • /
    • 1991
  • This paper examines the pecuniary effects stemming from insider trading in the equities of firms targeted for acquisition. Illegal exchanges by those having advantageous information are found to result in excessive returns to stockholders of the sought firms. However, unusual market activities are not typical immediately subsequent to the illegal trading date, suggesting that nonpublic information is synthesized by market mechanisms with sufficient speed so that others cannot profit by imitating the better informed traders. The obtained evidence does not support the contention that insider trading on nonpublic information harms the outsider stockholders of involved firms.

  • PDF