• Title/Summary/Keyword: Security design

Search Result 3,411, Processing Time 0.028 seconds

A Ternary Tree-based Authenticated Group Key Agreement For Dynamic Peer Group (동적 피어 그룹을 위한 삼진 트리방식의 인증된 그룹 키 합의 프로토콜)

  • Kim, Ho-Hee;Kim, Soon-Ja
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.22 no.6
    • /
    • pp.1253-1263
    • /
    • 2012
  • As a result of the increased popularity of group oriented applications, the design of an efficient authenticated group key agreement protocol has received a lot of attention. Lee et al. proposed a tree-based group key agreement protocol, which applies a ternary key tree structure and pairing-based cryptography to the key agreement of Dynamic Peer Group. In their protocol, only the group sponsor knows all member's session random keys computes all blinded keys. In addition, when the group sponsor leaves a group, all nodes of the tree should be changed. In this paper, we present the modified protocol that has several sponsors. Since a secret value for each member isn't given to the group sponsor, the key renewing of our protocol is more secure and efficient than that of Lee et al.'s protocol in the previous case. Therefore, our protocol is suitable to Dynamic Peer Groups.

Spatio-Temporal Summer Rainfall Pattern in 2020 from a Rainfall Frequency Perspective (2020년 여름철 강우의 시공간적 특성 분석: 빈도해석을 중심으로)

  • Kim, Yong-Tak;Park, Moonhyung;Kwon, Hyun-Han
    • Journal of Korean Society of Disaster and Security
    • /
    • v.13 no.4
    • /
    • pp.93-104
    • /
    • 2020
  • Climate change has emerged as a social issue, and efforts have been made to overcome it in various ways. However, climate change due to global warming is likely to accelerate further than we expected, and the associated damage is also likely to increase. This tendency is expected to continue in the future, leading to difficulties for the existing water resource management system based on historical data. The precipitation in 2020 caused property damage and loss of life due to the extreme rainfall exceeding the design rainfall with the very unusual prolonged rainy days. With this 2020 flood, we should no longer be passive in managing flood risk due to uncertainties in climate change.

Acceptance and Effectiveness of Distance Learning in Public Education in Saudi Arabia During Covid19 Pandemic: Perspectives from Students, Teachers and Parents

  • Alkinani, Edrees A.
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.2
    • /
    • pp.54-65
    • /
    • 2021
  • The movement control order and shutting down educational institution in Saudi Arabia has jeopardized the teaching and learning process. Education was shifted to distance learning in order to avoid any academic loss. In the middle of the Covid-19 crisis, there is a need to assess the full image of e-learning in Saudi Arabia. To investigate student and teachers' perception and acceptance, parents' attitudes and believes about distance education are the main goals of the study. The mix-method research design was employed to collect data. Three surveys were distributed to 100 students and 50 teachers and 50 parents from different educational institutions in Saudi Arabia, while semi-structured interviews were conducted with 10 parents. Random stratified and convenient sampling methods were adopted. Both descriptive and content analysis was conducted using SPSS25.0 and NVIVO software for quantitative and qualitative data accordingly. The findings showed that students are comfortable with remote education and are receiving enough support from schools and instructors but they think online education can't replace conventional face-to-face learning. Moreover, the results showed that teachers are having challenges in preparing online classes because of the development of conducting online classes and the lack of training. However, parents showed negative attitudes regarding the benefits and values of remote education and preferred conventional learning styles in elementary schools. Parents tended to reject and resist distance learning for several reasons: professional knowledge and lack of time to support their young kids in online classes, the shortcomings of e-learning, young children's inadequate self-regulation. Saudi parents are neither trained nor ready to use e-learning. The study provided suggestion and implications for teacher education and policymakers.

Evaluating the Usability and Effectiveness of Madrasati Platforms as a Learning Management System in Saudi Arabia for Public Education

  • Alkinani, Edrees A.;Alzahrani, Abdullah I.A.
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.6
    • /
    • pp.275-285
    • /
    • 2021
  • Ministries of Education are integrating different Learning Management Systems (LMS) to enhance teaching and learning during the lockdown to avoid academic loss. The key factor for delivering a high-quality education through LMS platforms is teachers' acceptance and adoption of the platform. Madrasati platform (which means My school) was introduced by Saudi Arabian Ministry of education as the formal teaching and learning for distance education for public education levels. This study aims to examine the effectiveness, usability and adoption of "Madrasati" platform from teachers' perspectives in Saudi Arabia. "SUS, CSUQ" tests were used to test the usability of the new platform. Using quantitative research design, data were collected using questionnaire. 200 teachers were selected randomly answered the survey. Data was analysed descriptively and inferentially using SPSS (25). The results obtained indicate that the teachers are highly satisfied using Madrasati platform and technically it is well designed. Also, Madrasati has positive effect on teaching quality. Moreover, Madrasati has high usability in teaching. One of the key findings were that the quality of the information content in Madrasati has a strong effect on teachers' perception of the Madrasati usefulness that led to a positive attitude towards Madrasati. These findings would be useful to the ministry of education and institutions trying to integrate technology in their teaching and learning processes. Thus, this paper contributes towards more effective utilisation of the extensive functionalities that Madrasati have to offer, which will contribute toward the development of pedagogy in Saudi Arabia.

Machine Learning-Based Detection of Cache Side Channel Attack Using Performance Counter Monitor of CPU (Performance Counter Monitor를 이용한 머신 러닝 기반 캐시 부채널 공격 탐지)

  • Hwang, Jongbae;Bae, Daehyeon;Ha, Jaecheol
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.30 no.6
    • /
    • pp.1237-1246
    • /
    • 2020
  • Recently, several cache side channel attacks have been proposed to extract secret information by exploiting design flaws of the microarchitecture. The Flush+Reload attack, one of the cache side channel attack, can be applied to malicious application attacks due to its properties of high resolution and low noise. In this paper, we proposed a detection system, which detects the cache-based attacks using the PCM(Performance Counter Monitor) for monitoring CPU cache activity. Especially, we observed the variation of each counter value of PCM in case of two kinds of attacks, Spectre attack and secret recovering attack during AES encryption. As a result, we found that four hardware counters were sensitive to cache side channel attacks. Our detector based on machine learning including SVM(Support Vector Machine), RF(Random Forest) and MLP(Multi Level Perceptron) can detect the cache side channel attacks with high detection accuracy.

An Account Management System on IOT Devices (사물인터넷 디바이스의 계정 관리 시스템)

  • Choi, Changwon;Chung, Hyuncheol
    • Journal of Internet of Things and Convergence
    • /
    • v.7 no.1
    • /
    • pp.71-77
    • /
    • 2021
  • As the IOT technology has developed, it becomes more big issues about IOT device security. An account management is a nerve-in-the-box routine job for the system administrator and users who manage the several hundreds IOT devices(IP camera, Home IOT, the various measuring equipment). This study is to propose the account management system by the hierarchical design and it is efficient for the user to manipulate the account management. The designed system supports 6 functions for the account management and apply the advanced technologies for the existed system. After the performance of the designed system is validated successfully by the authoritative test, the designed system is applied for the relative fields. And it is on going for the development of the smart account management system by applying the AI technique.

Artificial Intelligence in Personalized ICT Learning

  • Volodymyrivna, Krasheninnik Iryna;Vitaliiivna, Chorna Alona;Leonidovych, Koniukhov Serhii;Ibrahimova, Liudmyla;Iryna, Serdiuk
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.2
    • /
    • pp.159-166
    • /
    • 2022
  • Artificial Intelligence has stimulated every aspect of today's life. Human thinking quality is trying to be involved through digital tools in all research areas of the modern era. The education industry is also leveraging artificial intelligence magical power. Uses of digital technologies in pedagogical paradigms are being observed from the last century. The widespread involvement of artificial intelligence starts reshaping the educational landscape. Adaptive learning is an emerging pedagogical technique that uses computer-based algorithms, tools, and technologies for the learning process. These intelligent practices help at each learning curve stage, from content development to student's exam evaluation. The quality of information technology students and professionals training has also improved drastically with the involvement of artificial intelligence systems. In this paper, we will investigate adopted digital methods in the education sector so far. We will focus on intelligent techniques adopted for information technology students and professionals. Our literature review works on our proposed framework that entails four categories. These categories are communication between teacher and student, improved content design for computing course, evaluation of student's performance and intelligent agent. Our research will present the role of artificial intelligence in reshaping the educational process.

Crimean Citizen Journalism: Genesis and Trends in Communication Network

  • Iuksel, Gaiana Z.;Sydorenko, Natalііa M.;Dosenko, Anzhelika K.;Sytnyk, Oleksii V.;Dubetska, Oksana O.
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.2
    • /
    • pp.63-74
    • /
    • 2022
  • Repressive measures in the Crimea against the Ukrainian media and the ban on the entry of international and Ukrainian monitoring missions created the conditions for the function of providing information to be performed by representatives of civil society. Such a phenomenon was called Crimean citizen journalism and became a post-occupation phenomenon characteristic of the Crimean information sphere. The journalists' activities are aimed at reporting on human rights violations and repression against Ukrainian citizens who find themselves in conditions of information bans and restrictions. Crimean citizen journalism, which connects the peninsula with the mainland of Ukraine, is monothematic in nature, and its emergence has become a form of nonviolent resistance to the occupation of Crimea. The purpose of the study is to cover the characteristic features, the development of common Crimean citizen journalistic movement features as a social phenomenon, a phenomenon that arose after the occupation through the identification of a modern journalist portrait. The study uses the general scientific method of empirical research as the main one, the sociological method of a questionnaire survey, as well as the methods of classification, generalisation, observation, statistical calculation. An analysis of a survey of Crimean citizen journalists demonstrates the existence of an active, mobile community in Crimea that seeks to provide information and human rights nonviolent resistance to the occupation.

Conceptual bases of the Investment Mechanism of the Innovative Activity of Enterprises in the Context of Achieving the Tasks of Strategic Development

  • Komandrovska, Veronika;Kolesnyk, Maksym;Barkova, Kateryna;Vasylyk, Sergii;Dorofieiev, Denys
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.11
    • /
    • pp.111-118
    • /
    • 2021
  • The authors of the study highlight the conceptual foundations of the investment mechanism of innovation of enterprises in the context of strategic development. Such indicators of investment attraction for the enterprise as investment attractiveness, investment activity of the enterprise, critical mass of investments, minimum sufficiency of investments and others are singled out. It is proved that the balance of investment resources is facilitated by the action of the investment mechanism of innovation activity at the enterprise in the context of achievements of strategic development tasks. Investment processes and their intensification have an impact on the expansion of production capacity of economic entities in strategic development and on improving the efficiency of existing capacities. The investment mechanism of innovative activity at the enterprise in the context of achievement of tasks of strategic development contains system of complex actions which provides: definition of the clear purpose and tasks for the mechanism and achievement of the purposes of the enterprise; assessment of the investment potential of the enterprise; definition of tasks of innovative development of enterprises and investment resources necessary for this purpose, etc. The tasks of the investment mechanism of innovative activity at the enterprise in the context of achievements of tasks of strategic development and its economic, organizational and information components are singled out, as well as levers of influence and regulators of the investment mechanism of innovation in the enterprise.

Design and implementation of blockchain-based anti-theft protocol in Lora environment (Lora 환경에서 블록체인 기반 도난방지 프로토콜 설계 및 구현)

  • Park, Jung-oh
    • Journal of Convergence for Information Technology
    • /
    • v.12 no.4
    • /
    • pp.1-8
    • /
    • 2022
  • With the development of communication infrastructure, the number of network equipment owned by one person is gradually increasing. General-purpose devices such as smartphones can implement theft/loss prevention function by implementing S/W. However, other small devices lack practicality such as long-distance communication problems due to standard communication technology specifications or H/W limitations, and lack of functions(authentication and security). This study combines the Lora communication protocol in the LPWA standard environment and the blockchain technology. Anti-theft and security functions were added to the protocol, and the PBFT consensus algorithm was applied to build a blockchain network. As a result of the test, the effectiveness of safety(authentication and trust network) and performance(blockchain processing performance) were confirmed. This study aims to contribute to the future development of portable or small device anti-theft products as a 4th industrial convergence research.