• Title/Summary/Keyword: Security design

Search Result 3,411, Processing Time 0.028 seconds

The Smart Medicine Delivery Using UAV for Elderly Center

  • Li, Jie;Weiwei, Goh;N.Z., Jhanjhi;David, Asirvatham
    • International Journal of Computer Science & Network Security
    • /
    • v.23 no.1
    • /
    • pp.78-88
    • /
    • 2023
  • Medication safety and medicine delivery challenge the well-being of the elderly and the management of the elderly center. With the outbreak of COVID-19, the elderly in the care center were challenged by the inconvenience of the medication restocking. The purpose of this paper accentuates the importance of the design and development of an UAV-based Smart Medicine Case (UAV-SMC) to improve the performance of medication management and medicine delivery in the elderly center. The researchers came up with the design of UAV-SMC in the light of the UAV and IoT technology to improve the performance of both Medication Practice Management (MPM) and Low Inventory Detection and Delivery (LIDD). Based on the result, with UAV-SMC, the performance of both MPM and LIDD was significantly improved. The UAV-SMC improves the efficacy of medication management in the elderly center by 26.97 to 149.83 seconds for each medication practice and 9.03 mins for each time of medicine delivery in Subang Jaya Malaysia. This paper only investigates the adoption of UAV-SMC in the content of elderly center rather than other industries. The authors consider integrating the UAV-SMC with the e-pharmacy system in the future. In conclusion, the UAV-SMC has significantly improved the medication management and guard the safety of elderly and caretaker in the elderly in the post-pandemic times.

State-Based Behavior Modeling in Software and Systems Engineering

  • Sabah Al-Fedaghi
    • International Journal of Computer Science & Network Security
    • /
    • v.23 no.5
    • /
    • pp.21-32
    • /
    • 2023
  • The design of complex man-made systems mostly involves a conceptual modeling phase; therefore, it is important to ensure an appropriate analysis method for these models. A key concept for such analysis is the development of a diagramming technique (e.g., UML) because diagrams can describe entities and processes and emphasize important aspects of the systems being described. The analysis also includes an examination of ontological concepts such as states and events, which are used as a basis for the modeling process. Studying fundamental concepts allows us to understand more deeply the relationship between these concepts and modeling frameworks. In this paper, we critically analyze the classic definition of a state utilizing the Thinging machine (TM) model. States in state machine diagrams are considered the appropriate basis for modeling system behavioral aspects. Despite its wide application in hardware design, the integration of a state machine model into a software system's modeling requirements increased the difficulty of graphical representation (e.g., integration between structural and behavioral diagrams). To understand such a problem, in this paper, we project (create an equivalent representation of) states in TM machines. As a case study, we re-modeled a state machine of an assembly line system in a TM. Additionally, we added possible triggers (transitions) of the given states to the TM representation. The outcome is a complicated picture of assembly line behavior. Therefore, as an alternative solution, we re-modeled the assembly line based solely on the TM. This new model presents a clear contrast between state-based modeling of assembly line behavior and the TM approach. The TM modeling seems more systematic than its counterpart, the state machine, and its notions are well defined. In a TM, states are just compound events. A model of a more complex system than the one in the assembly line has strengthened such a conclusion.

An ICI Canceling 5G System Receiver for 500km/h Linear Motor Car

  • Suguru Kuniyoshi;Rie Saotome;Shiho Oshiro;Tomohisa Wada
    • International Journal of Computer Science & Network Security
    • /
    • v.23 no.6
    • /
    • pp.27-34
    • /
    • 2023
  • This paper proposed an Inter-Carrier-Interference (ICI) Canceling Orthogonal Frequency Division Multiplexing (OFDM) receiver for 5G mobile system to support 500 km/h linear motor high speed terrestrial transportation service. A receiver in such high-speed train sees the transmission channel which is composed of multiple Doppler-shifted propagation paths. Then, a loss of sub-carrier orthogonality due to Doppler-spread channels causes ICI. The ICI Canceler is realized by the following three steps. First, using the Demodulation Reference Symbol (DMRS) pilot signals, it analyzes three parameters such as attenuation, relative delay, and Doppler-shift of each multi-path component. Secondly, based on the sets of three parameters, Channel Transfer Function (CTF) of sender sub-carrier number 𝒏 to receiver sub-carrier number 𝒍 is generated. In case of 𝒏≠𝒍, the CTF corresponds to ICI factor. Thirdly, since ICI factor is obtained, by applying ICI reverse operation by Multi-Tap Equalizer, ICI canceling can be realized. ICI canceling performance has been simulated assuming severe channel condition such as 500 km/h, 2 path reverse Doppler Shift for QPSK, 16QAM, 64QAM and 256QAM modulations. In particular, for modulation schemes below 16QAM, we confirmed that the difference between BER in a 2 path reverse Doppler shift environment and stationary environment at a moving speed of 500 km/h was very small when the number of taps in the multi-tap equalizer was set to 31 taps or more. We also confirmed that the BER performance in high-speed mobile communications for multi-level modulation schemes above 64QAM is dramatically improved by the use of a multi-tap equalizer.

Design Method of Things Malware Detection System(TMDS) (소규모 네트워크의 IoT 보안을 위한 저비용 악성코드 탐지 시스템 설계 방안 연구)

  • Sangyoon Shin;Dahee Lee;Sangjin Lee
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.33 no.3
    • /
    • pp.459-469
    • /
    • 2023
  • The number of IoT devices is explosively increasing due to the development of embedded equipment and computer networks. As a result, cyber threats to IoT are increasing, and currently, malicious codes are being distributed and infected to IoT devices and exploited for DDoS. Currently, IoT devices that are the target of such an attack have various installation environments and have limited resources. In addition, IoT devices have a characteristic that once set up, the owner does not care about management. Because of this, IoT devices are becoming a blind spot for management that is easily infected with malicious codes. Because of these difficulties, the threat of malicious codes always exists in IoT devices, and when they are infected, responses are not properly made. In this paper, we will design an malware detection system for IoT in consideration of the characteristics of the IoT environment and present detection rules suitable for use in the system. Using this system, it will be possible to construct an IoT malware detection system inexpensively and efficiently without changing the structure of IoT devices that are already installed and exposed to cyber threats.

Study on Fish-friendly Flow Characteristic in Stepped Fishway (계단식 어도에서의 어류 친화적 흐름 특성 연구)

  • Chanjin Jeong;Dong Hyun Kim;Hyung Suk Kim;Seung Oh Lee
    • Journal of Korean Society of Disaster and Security
    • /
    • v.16 no.2
    • /
    • pp.65-73
    • /
    • 2023
  • Fishways are essential structures that must be installed in rivers to facilitate the movement of fish between upstream and downstream areas. However, the efficiency of fish passage varies depending on the flow conditions within the fishway. Therefore, this study examined the fish-friendly flow characteristics within a stepped fishway at different overflow depths using FLOW-3D, and conducted experiments for model validation. The key parameters affecting fish swimming ability include velocity, turbulent kinetic energy, and energy dissipation rate. These factors were assessed using a simulated fish species, the zacco platypus, to evaluate the suitability of fish-friendly flow condition. It was confirmed that overflow depth significantly influences fish behavior, and an appropriate overflow depth is required for stepped fishway design. The results of this study are expected to serve as fundamental data for the design of stepped fishways in the future.

A Digital Forensic Framework Design for Joined Heterogeneous Cloud Computing Environment

  • Zayyanu Umar;Deborah U. Ebem;Francis S. Bakpo;Modesta Ezema
    • International Journal of Computer Science & Network Security
    • /
    • v.24 no.6
    • /
    • pp.207-215
    • /
    • 2024
  • Cloud computing is now used by most companies, business centres and academic institutions to embrace new computer technology. Cloud Service Providers (CSPs) are limited to certain services, missing some of the assets requested by their customers, it means that different clouds need to interconnect to share resources and interoperate between them. The clouds may be interconnected in different characteristics and systems, and the network may be vulnerable to volatility or interference. While information technology and cloud computing are also advancing to accommodate the growing worldwide application, criminals use cyberspace to perform cybercrimes. Cloud services deployment is becoming highly prone to threats and intrusions. The unauthorised access or destruction of records yields significant catastrophic losses to organisations or agencies. Human intervention and Physical devices are not enough for protection and monitoring of cloud services; therefore, there is a need for more efficient design for cyber defence that is adaptable, flexible, robust and able to detect dangerous cybercrime such as a Denial of Service (DOS) and Distributed Denial of Service (DDOS) in heterogeneous cloud computing platforms and make essential real-time decisions for forensic investigation. This paper aims to develop a framework for digital forensic for the detection of cybercrime in a joined heterogeneous cloud setup. We developed a Digital Forensics model in this paper that can function in heterogeneous joint clouds. We used Unified Modeling Language (UML) specifically activity diagram in designing the proposed framework, then for deployment, we used an architectural modelling system in developing a framework. We developed an activity diagram that can accommodate the variability and complexities of the clouds when handling inter-cloud resources.

Indirection based Multilevel Security Model and Application of Rehabilitation Psychology Analysis System (재활심리분석시스템의 다중 우회기반 접근통제 모델 및 응용)

  • Kim, Young-Soo;Jo, Sun-Goo
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.17 no.10
    • /
    • pp.2301-2308
    • /
    • 2013
  • These days, Rehabilitation psychology analysis system is being used by world wide web in everyday's life. And on the other hand, we are facing spam messages' problems. To block these spam message, we are using filtering or pricing systems. But these solutions are raising other problems such as impediment in reception or availability caused by false positive or payment resistance. To solve these problems, we propose an Indirect Model on Message Control System(IMMCS) which controls an unsolicited message and prevents an useful message from discarding. We design and implement the IMMCS to enhance the usefulness and the availability. Being tested the IMMCS to verify the usability and the efficiency, it gave us a very successful result.

Design and Analysis of Lightweight Trust Mechanism for Accessing Data in MANETs

  • Kumar, Adarsh;Gopal, Krishna;Aggarwal, Alok
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.8 no.3
    • /
    • pp.1119-1143
    • /
    • 2014
  • Lightweight trust mechanism with lightweight cryptographic primitives has emerged as an important mechanism in resource constraint wireless sensor based mobile devices. In this work, outlier detection in lightweight Mobile Ad-hoc NETworks (MANETs) is extended to create the space of reliable trust cycle with anomaly detection mechanism and minimum energy losses [1]. Further, system is tested against outliers through detection ratios and anomaly scores before incorporating virtual programmable nodes to increase the efficiency. Security in proposed system is verified through ProVerif automated toolkit and mathematical analysis shows that it is strong against bad mouthing and on-off attacks. Performance of proposed technique is analyzed over different MANET routing protocols with variations in number of nodes and it is observed that system provide good amount of throughput with maximum of 20% increase in delay on increase of maximum of 100 nodes. System is reflecting good amount of scalability, optimization of resources and security. Lightweight modeling and policy analysis with lightweight cryptographic primitives shows that the intruders can be detection in few milliseconds without any conflicts in access rights.

Design and Implementation of effective ECC Encryption Algorithm for Voice Data (음성 데이터 보안을 위한 효율적인 ECC 암호 알고리즘 설계 및 구현)

  • Kim, Hyun-Soo;Park, Seok-Cheon
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.15 no.11
    • /
    • pp.2374-2380
    • /
    • 2011
  • Many people is preferred to mVoIP which offers call telephone-quality and convenient UI as well as free of charge. On the other hand, security of mVoIP is becoming an issue as it using Internet network may have danger about wiretapping. Although traditionally encryption algorithm of symmetric key for security of voice data has been used, ECC algorithm of public key type has been preferring for encryption because it is stronger in part the strength of encryption than others. However, the existing way is restricted by lots of operations in poor mobile environment. Thus this paper proposes the efficiency of resource consumption way by reducing cryptographic operations.

Development of The Home Control System Base on USB (USB에 기반한 홈 제어 시스템 개발)

  • Lee Chang-Goo;Kim Hee-Sun
    • Journal of Institute of Control, Robotics and Systems
    • /
    • v.12 no.4
    • /
    • pp.405-410
    • /
    • 2006
  • This paper presents the design of a USB home controller and a home control system that specially is focused on controlling home appliances as a part of home network systems, the implementation of the USB device access class in an OSGi service platform and a home security system as an application. Designed USB home controllers are able to control various home appliances. They can be used not only to control big home appliances like a boiler but also to control small home appliances like a toaster because they are low-cost solutions. The USB home controller supports real time control using the interrupt transfer of the USB specification. And It is easy to use by homemakers who have no technical knowledge of the system because they just plug and unplug it in a home server then it automatically joins and leaves a home control system. This technique is based on hot-plug and the USB Device Access class in an OSGi Service Platform. The USB Device Access class supports the coordination of automatic detection and attachment of the USB home controller on an OSGi Service Platform, and it downloads and installs device drivers on demand. For an application, we implemented and tested a home security system using two USB home controllers and a CDMA module.