• Title/Summary/Keyword: Security and Resilience

Search Result 103, Processing Time 0.033 seconds

Role of Agroforestry Trees in Sustaining Livelihood: A Case of Communities in Western Himalayas

  • Nagar, Bhuvnesh;Rawat, Sushma;Kumar, Munesh
    • Journal of Forest and Environmental Science
    • /
    • v.33 no.2
    • /
    • pp.91-96
    • /
    • 2017
  • Trees at farm are considered as one of the option to reduce poverty of smallholders by contributing to livelihood security and resilience to climate change. A perception based study was conducted to assess the cultural importance of tree species suitable for practicing agroforestry in randomly selected agroforestry-dominated villages in Alaknanda valley of Western Himalayas during 2015-16. Semi-structured questionnaire was used to collect primary data on the provisioning services of major agroforestry tree species in randomly surveyed 87 households. Based on cultural importance (CI) index value, the most suitable agroforestry tree species was Morus alba (3.32) followed by Celtis australis (3.22), Mangifera indica (3.01), Grewia optiva (2.79), Toona ciliata (2.22), Bauhinia variegata (2.08), Leucaena leucocephala (1.76) and Emblica officinalis (1.74). The preference of use has also been governed based on their indigenous knowledge. This study will also facilitate in evaluating the importance of provisioning services of agroforestry tree species in improving livelihood as well as facilitates smallholder's resilience to climate change in Western Himalayas.

A Study on improvement for disaster resilience of the smart city - Mainly on the data analysis in Great East Japan Earthquake (스마트시티의 재해회복력 향상을 위한 고찰 - 동일본 대지진 데이터 분석을 중심으로)

  • Chang, Hye-Jung;Kim, Do-Nyun
    • The Journal of Korea Institute of Information, Electronics, and Communication Technology
    • /
    • v.9 no.4
    • /
    • pp.373-387
    • /
    • 2016
  • The citizen is going to live on security for better life stably in all times, and, as for such human basic desire, it is to the base which is important about the durability and the development of the smart city. I defined needs and the priority about the disaster recovery of the community as a citizen through date analysis until I came back to the normal environment again after a smart city suffered the damage by the misfortune in the study. I was going to suggest a method to support inhabitants of the damage area that was the immediate, and was necessary for a base in such date analysis and recovery of the community. I considered the Great East Japan Earthquake in an example in 2011. I studied the smart city plan which could improve the resilience of the local citizen and community through data utilization.

S.O.S : Shield of Steam Protection Based on API Call Birthmark in Online Game ESD DRM (S.O.S : Shield of Steam API 콜 버스마크 기반의 온라인 게임 ESD DRM 보호)

  • Oh, Dong Bin;Kim, Huy Kang
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.28 no.6
    • /
    • pp.1297-1307
    • /
    • 2018
  • The rise of Online game ESD(Electronic Software Distribution) like Steam, the method of game piracy are more diversified. In Online Game ESD, Software DRM is applied to game because we have to play in offline situation, but it is easily bypassed due to low security level. In this study, we analyze crack files of pirated games to learn how to bypass Steam DRM and to establish countermeasures for based on API call birthmark. The generated birthmark showed more than 85% resilience in representing crack groups and 95% credibility in detecting cracked games. With this study, it is possible to enhance the security of the online game Electronic Software Distribution platform, and to provide a high level of game piracy protection for indie game developers, especially those who can not purchase Third Party DRM to protect their own games.

Zero-Knowledge Realization of Software-Defined Gateway in Fog Computing

  • Lin, Te-Yuan;Fuh, Chiou-Shann
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.12 no.12
    • /
    • pp.5654-5668
    • /
    • 2018
  • Driven by security and real-time demands of Internet of Things (IoT), the timing of fog computing and edge computing have gradually come into place. Gateways bear more nearby computing, storage, analysis and as an intelligent broker of the whole computing lifecycle in between local devices and the remote cloud. In fog computing, the edge broker requires X-aware capabilities that combines software programmability, stream processing, hardware optimization and various connectivity to deal with such as security, data abstraction, network latency, service classification and workload allocation strategy. The prosperous of Field Programmable Gate Array (FPGA) pushes the possibility of gateway capabilities further landed. In this paper, we propose a software-defined gateway (SDG) scheme for fog computing paradigm termed as Fog Computing Zero-Knowledge Gateway that strengthens data protection and resilience merits designed for industrial internet of things or highly privacy concerned hybrid cloud scenarios. It is a proxy for fog nodes and able to integrate with existing commodity gateways. The contribution is that it converts Privacy-Enhancing Technologies rules into provable statements without knowing original sensitive data and guarantees privacy rules applied to the sensitive data before being propagated while preventing potential leakage threats. Some logical functions can be offloaded to any programmable micro-controller embedded to achieve higher computing efficiency.

The Analysis of Resilience of Programming Class' Students for Basic Liberal Arts (기초교양필수 과목인 스크래치와 파이썬 프로그래밍 과목 수강생의 회복탄력성 분석)

  • Kim, Semin;You, Kangsoo;Hong, Kicheon;Cho, Youngbok
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.23 no.7
    • /
    • pp.801-806
    • /
    • 2019
  • Recently, each university has been lecturing a lot on the liberal arts subject by emphasizing software education. However, students are often motivated by the difficulty of learning programming, the inability to recognize why they should learn programming, or even the fact that they do not try. The reason for the resilience is to guide programming learning to have the power to recover from the point of abandonment to proceed with the learning again. In this study, recovery elasticity pre-post-examination was conducted on the parts that learned scratches and those that learned Python. Studies have shown that while Scratch appears to be trying to accept and work harder, Python has been relatively more difficult than Scratch. It is expected that this study will help identify the factors that can sustain programming learning.

Resilient Security Protocol for Combating Replay Attacks in Wireless Sensor Networks (리플레이 공격 방어를 위한 무선 센서 네트워크 보안 프로토콜)

  • Zhang, Di;Heo, Ung;You, Kang-Soo;Choi, Jae-Ho
    • The Journal of the Korea Contents Association
    • /
    • v.10 no.7
    • /
    • pp.70-80
    • /
    • 2010
  • Due to the resource limitations of sensor nodes, providing a security protocol is a particular challenge in sensor networks. One popular method is the neighborhood-based key agreement protocol (NEKAP). NEKAP is an efficient and lightweight protocol, but it includes loopholes through which adversaries may launch replay attacks by successfully masquerading as legitimate nodes. In this paper, we present a modified security protocol for wireless sensor networks. We provide four types of keys for each node, which adapt to different security requirements; and an improvement is made to alleviate the replay attack. According to our qualitative performance analyses, the proposed security protocol provides effectiveness in terms of authentication security, attacking node detection, and replay attack resilience when compared to the conventional method.

Communication Pattern Based Key Establishment Scheme in Heterogeneous Wireless Sensor Networks

  • Kim, Daehee;Kim, Dongwan;An, Sunshin
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.10 no.3
    • /
    • pp.1249-1272
    • /
    • 2016
  • In this paper, we propose a symmetric key establishment scheme for wireless sensor networks which tries to minimize the resource usage while satisfying the security requirements. This is accomplished by taking advantage of the communication pattern of wireless sensor networks and adopting heterogeneous wireless sensor networks. By considering the unique communication pattern of wireless sensor networks due to the nature of information gathering from the physical world, the number of keys to be established is minimized and, consequently, the overhead spent for establishing keys decreases. With heterogeneous wireless sensor networks, we can build a hybrid scheme where a small number of powerful nodes do more works than a large number of resource-constrained nodes to provide enhanced security service such as broadcast authentication and reduce the burden of resource-limited nodes. In addition, an on-demand key establishment scheme is introduced to support extra communications and optimize the resource usage. Our performance analysis shows that the proposed scheme is very efficient and highly scalable in terms of storage, communication and computation overhead. Furthermore, our proposed scheme not only satisfies the security requirements but also provides resilience to several attacks.

An Efficient Broadcast Authentication Scheme with Batch Verification for ADS-B Messages

  • Yang, Haomiao;Kim, Hyunsung;Li, Hongwei;Yoon, Eunjun;Wang, Xiaofen;Ding, Xuefeng
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.7 no.10
    • /
    • pp.2544-2560
    • /
    • 2013
  • As a cornerstone of the next generation air traffic management (ATM), automatic dependent surveillance-broadcast (ADS-B) system can provide continual broadcast of aircraft position, identity, velocity and other messages over unencrypted data links to generate a common situational awareness picture for ATM. However, since ADS-B messages are unauthenticated, it is easy to insert fake aircrafts into the system via spoofing or insertion of false messages. Unfortunately, the authentication for ADS-B messages has not yet been well studied. In this paper, we propose an efficient broadcast authentication scheme with batch verification for ADS-B messages which employs an identity-based signature (IBS). Security analysis indicates that our scheme can achieve integrity and authenticity of ADS-B messages, batch verification, and resilience to key leakage. Performance evaluation demonstrates that our scheme is computationally efficient for the typical avionics devices with limited resources, and it has low communication overhead well suitable for low-bandwidth ADS-B data link.

An Intelligent Game Theoretic Model With Machine Learning For Online Cybersecurity Risk Management

  • Alharbi, Talal
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.6
    • /
    • pp.390-399
    • /
    • 2022
  • Cyber security and resilience are phrases that describe safeguards of ICTs (information and communication technologies) from cyber-attacks or mitigations of cyber event impacts. The sole purpose of Risk models are detections, analyses, and handling by considering all relevant perceptions of risks. The current research effort has resulted in the development of a new paradigm for safeguarding services offered online which can be utilized by both service providers and users. customers. However, rather of relying on detailed studies, this approach emphasizes task selection and execution that leads to successful risk treatment outcomes. Modelling intelligent CSGs (Cyber Security Games) using MLTs (machine learning techniques) was the focus of this research. By limiting mission risk, CSGs maximize ability of systems to operate unhindered in cyber environments. The suggested framework's main components are the Threat and Risk models. These models are tailored to meet the special characteristics of online services as well as the cyberspace environment. A risk management procedure is included in the framework. Risk scores are computed by combining probabilities of successful attacks with findings of impact models that predict cyber catastrophe consequences. To assess successful attacks, models emulating defense against threats can be used in topologies. CSGs consider widespread interconnectivity of cyber systems which forces defending all multi-step attack paths. In contrast, attackers just need one of the paths to succeed. CSGs are game-theoretic methods for identifying defense measures and reducing risks for systems and probe for maximum cyber risks using game formulations (MiniMax). To detect the impacts, the attacker player creates an attack tree for each state of the game using a modified Extreme Gradient Boosting Decision Tree (that sees numerous compromises ahead). Based on the findings, the proposed model has a high level of security for the web sources used in the experiment.

Design of Emergency Management System for Societal Security Network (사회 안전망을 위한 위기관리시스템 설계)

  • Kim, Yoon-Ho;Kang, Hee-Jo
    • Journal of Advanced Navigation Technology
    • /
    • v.16 no.5
    • /
    • pp.879-884
    • /
    • 2012
  • In accelerating the industrialization, human being have been frequently experiencing man-made crisis such as technology failures, financial problem as well as natural disaster. Emergency management system based on international standard can provide an organization with a framework for continual improvement to increase the possibility of enhancing anticipation, prevention and response as well. In this paper, we introduced the emergency management system design of various organizations for societal security network. In the first, the main role of ISO/TC223 is reviewed and then, current issues of under going standardization in ISO are also addressed. Finally, we have designed a efficient disaster prevention system to minimize the potential risk as well as to improve the organizational resilience.