• Title/Summary/Keyword: Security Strategies

Search Result 620, Processing Time 0.028 seconds

A Survey on Trust Computation in the Internet of Things

  • Truong, Nguyen B.;Jayasinghe, Upul;Um, Tai-Won;Lee, Gyu Myoung
    • Information and Communications Magazine
    • /
    • v.33 no.2
    • /
    • pp.10-27
    • /
    • 2016
  • Internet of Things defines a large number of diverse entities and services which interconnect with each other and individually or cooperatively operate depending on context, conditions and environments, produce a huge personal and sensitive data. In this scenario, the satisfaction of privacy, security and trust objectives plays a critical role in the success of the Internet of Things. Trust here can be considered as a key property to establish trustworthy and seamless connectivity among entities and to guarantee secure services and applications. The aim of this study is to provide a survey on various trust computation strategies and identify future trends in the field. We discuss trust computation methods under several aspects and provide comparison of the approaches based on trust features, performance, advantages, weaknesses and limitations of each strategy. Finally the research discuss on the gap of the trust literature and raise some research directions in trust computation in the Internet of Things.

Study on Safety Assessment for Train Control Communication Systems (열차제어 통신시스템의 안전성 평가를 위한 연구)

  • Jo, Hyun-Jeong;Hwang, Jong-Gyu;Jeong, Rak-Gyo
    • Proceedings of the KIEE Conference
    • /
    • 2009.04b
    • /
    • pp.186-188
    • /
    • 2009
  • Safety-critical systems related to the railway communications are currently undergoing changes. Mechanical and electro-mechanical devices are being replaced by programmable electronics that are often controlled remotely via communication networks. Therefore designers and operators now not only have to contend with component failures and user errors, but also with the possibility that malicious entities are seeking to disrupt the services provided by theirs systems. This paper discusses the safety strategies employed in the railway communications and proposes a security mechanism for Korean railway communication system.

  • PDF

Trends in Digital Trade Policies and Trade Rules in Major Overseas Countries (해외 주요국의 디지털 통상 정책 및 무역 협정 규범 동향)

  • Kim, J.E.
    • Electronics and Telecommunications Trends
    • /
    • v.37 no.5
    • /
    • pp.1-10
    • /
    • 2022
  • Digital trade rules are crucial in supporting the digital economy as the rules effectively reduce unnecessary trade barriers. This study introduces various approaches that major countries take regarding digital trade policies and rules. Comprehensive and Progressive Agreement for Trans-Pacific Partnership has introduced comprehensive rules on e-commerce, including binding articles on the free flow of information, location of computing facilities, and source code. More recent e-commerce provisions or digital trade agreements cover wider range of issues, from cyber security, artificial intelligence, and data innovation to electronic invoicing and payments. Multilateral negotiations on digital trade rules, including the World Trade Organization E-commerce Joint Statement Initiatives and Indo-Pacific Economic Framework, are in progress. Thus, countries involved are expected to respond to new digital trade issues with long-term strategies considering domestic policy objectives.

Hybrid Resource Allocation Scheme in Secure Intelligent Reflecting Surface-Assisted IoT

  • Su, Yumeng;Gao, Hongyuan;Zhang, Shibo
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.16 no.10
    • /
    • pp.3256-3274
    • /
    • 2022
  • With the rapid development of information and communications technology, the construction of efficient, reliable, and safe Internet of Things (IoT) is an inevitable trend in order to meet high-quality demands for the forthcoming 6G communications. In this paper, we study a secure intelligent reflecting surface (IRS)-assisted IoT system where malicious eavesdropper trying to sniff out the desired information from the transmission links between the IRS and legitimate IoT devices. We discuss the system overall performance and propose a hybrid resource allocation scheme for maximizing the secrecy capacity and secrecy energy efficiency. In order to achieve the trade-off between transmission reliability, communication security, and energy efficiency, we develop a quantum-inspired marine predator algorithm (QMPA) for realizing rational configuration of system resources and prevent from eavesdropping. Simulation results demonstrate the superiority of the QMPA over other strategies. It is also indicated that proper IRS deployment and power allocation are beneficial for the enhancement of system overall capacity.

The Relationship Between Firm's Managerial Strategic Deviance and Cost Adjustment: Evidence from Korea

  • Kwon, Hyeok-Gi;Shin, Heejeong
    • Journal of East Asia Management
    • /
    • v.4 no.1
    • /
    • pp.79-98
    • /
    • 2023
  • This study investigates the relationship between firm's cost behavior and the managerial strategic deviation. Firms which intend to reduce uncertainty and improve viability for future performance tend to implement managerial strategies similar to peer firms in the same industry. Since the managerial decisions affect firm's cost behavior, the strategic deviation including operations different from others would be associated with cost behavior distinct from peer firms. On firms listed on Korean Security Exchange and KOSDAQ markets from 2002 to 2017, the analysis show the results that the firm's strategic deviation is positively associated with cost-downward rigidity, indicating that the management strategy affects the cost behavior. Also, it means that corporate managers who choose a strategy that deviates from peer firms are less likely to adjust their resource even when sales decrease. This study is meaningful in expanding the literature on the determinants of cost behavior by analyzing the effect of the management strategy's characteristics of strategic deviation on cost behavior.

Strategic Technology Policy Trends and Implications in Leading Countries (주요국 전략기술 정책 비교: 기술 선정을 중심으로)

  • J.R. Park;S.M. Kim;S.S. Choi;S.J. Yeon
    • Electronics and Telecommunications Trends
    • /
    • v.38 no.4
    • /
    • pp.12-24
    • /
    • 2023
  • The acquisition of advanced scientific and technological knowledge is essential for the economic and security interests of any nation. Major countries are actively accumulating capacities by strategically identifying and nurturing key technologies, aiming to gain a competitive advantage amidst internal and external environmental shifts and the global competition for technological dominance. By comparing and analyzing trends in strategic technology policies in leading countries, we may be able to understand Korea's technology status and level as well as identify technologies to focus or develop. Accordingly, this study scrutinizes policy trends, criteria for technology selection, objectives, and strategies adopted by major countries regarding strategic technologies and offers insights into Korea's technological development by means of comparative analyses across strategic technologies among these countries.

Unveiling the Effects of ICT Adoption in the Apparel Sector of Bangladesh Based on Technology-Organization-Environment Framework

  • S.M. Shafiul Alam
    • Asia pacific journal of information systems
    • /
    • v.33 no.4
    • /
    • pp.977-998
    • /
    • 2023
  • The study is based on the technology-organization-environment (TOE) model which, attempted to determine the factors that are going to influence ICT adoption. The proposed research model evaluates the interplay among technological context (IT infrastructure, system security, and user capacity), organizational context (top management commitment, and innovations strategies), environmental context (quick response to the external agencies, interactive network infrastructure, and competitive pressure) and ICT adoption (productivity growth, organizational change, and competitiveness). Data were collected from 243 senior executives of full member firms of the Bangladesh Garments and Manufacturers Association (BGMEA) of examining the relationships among the constructs in the proposed framework utilizing structural equation modeling (SEM). The analysis of TOE factors revealed that environmental, organizational, and technological factors have a significant impact on the successful implementation of ICT tools. The study also discusses implications for management practitioners.

Revisited Security Evaluation on Midori-64 against Differential Cryptanalysis

  • Guoyong Han;Hongluan Zhao
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.18 no.2
    • /
    • pp.478-493
    • /
    • 2024
  • In this paper, the Mixed Integer Linear Programming (MILP) model is improved for searching differential characteristics of block cipher Midori-64, and 4 search strategies of differential path are given. By using strategy IV, set 1 S-box on the top of the distinguisher to be active, and set 3 S-boxes at the bottom to be active and the difference to be the same, then we obtain a 5-round differential characteristics. Based on the distinguisher, we attack 12-round Midori-64 with data and time complexities of 263 and 2103.83, respectively. To our best knowledge, these results are superior to current ones.

The Rise of Drone Swarms: Military Applications, Countermeasures, and Strategic Implications

  • Hwang Hyun-Ho
    • International Journal of Advanced Culture Technology
    • /
    • v.12 no.2
    • /
    • pp.318-325
    • /
    • 2024
  • The rapid advancement of drone technology has led to the emergence of drone swarms, a game-changing concept in modern warfare. This study explores the military applications, countermeasures, and strategic implications of drone swarms. By examining the current trends in drone swarm development and deployment, this research highlights the potential of this technology to revolutionize the battlefield. The study also investigates the challenges and vulnerabilities associated with drone swarms, emphasizing the need for effective countermeasures. Through an analysis of multi-sensor fusion, directed energy weapons, and artificial intelligence, this research proposes comprehensive strategies to counter the threats posed by drone swarms. Furthermore, the study delves into the ethical and legal issues surrounding the use of autonomous drone swarms, underscoring the necessity for international norms and regulations. The findings of this research contribute to the understanding of the transformative impact of drone swarms on military strategy and national security, while providing valuable insights for policymakers, military strategists, and researchers in the field.

Korea's Public Diplomacy Policy towards Africa: Strategies, Instruments and Its Implications on Economic Linkages with Africa (한국의 대 아프리카 공공외교: 전략과 방안 그리고 경제 연계에 미치는 영향)

  • Ochieng, Haggai Kennedy;Iffat, Tahira;Kim, Sungsoo
    • Journal of the Economic Geographical Society of Korea
    • /
    • v.23 no.3
    • /
    • pp.312-333
    • /
    • 2020
  • Korea-Africa relations date back to the period of independence of African countries. During this time, the ties between Korea and Africa has passed through stagnation, inconsistencies and weak diplomatic exchanges. Recently, Korea began to refocus its efforts towards Africa in order to revitalize their relations. This paper examines Korea's public diplomacy strategies towards Africa and how its various strategies are working in the interest of Korea as well as Africa. The study shows that Korea's renewed interest in Africa is primarily driven by the security threat from North Korea and the need to diversify its market for industrial goods as well as energy sources. The latter motives override Korea's interest in the continent. These motives are not at variance with those pursued by large powers like the US and China in Africa. Furthermore, the paper shows that Korea is employing a mixture of public diplomacy instruments in Africa with varied outcomes. Economic linkages between Korea and Africa are on an upward trajectory since the late 2000s. In order to build sustainable relations, the paper provides a number suggestions with far-reaching implications on Korea's public diplomacy towards Africa in the future.