• Title/Summary/Keyword: Security design

Search Result 3,411, Processing Time 0.035 seconds

Study on Component-Based Middleware for IoT Service Scalability (IoT 서비스 확장성을 고려한 컴포넌트 기반의 미들웨어에 관한 연구)

  • Shin, Seung-Hyeok
    • Journal of Advanced Navigation Technology
    • /
    • v.19 no.4
    • /
    • pp.330-337
    • /
    • 2015
  • A service in the environments of internet of things (IoT) exist various types with automation facilities and sensors. There can configure so many communication protocols to networking facilities and sensors. To provide efficient various kind of service, a middleware platform, is based on the internet protocol network, is needed a unified access with devices, controlling and monitoring huge kind of facilities and sensors, to provide a efficient IoT service and application configurations. In this paper, we propose a middleware that an application and service interact with automation facilities and monitor sensors. The proposed middleware is designed with adapter pattern that one of the software engineering design pattern. The adapter pattern is to ensure communication with each sensor and to make sure of service scalability. Finally, the proposed component middleware shows that variety sensors can be easily configure the service in the IoT environment.

Design and Implementation of an Application Level Mobile Server for On-the-site Oriented Services (현장 중심 서비스를 위한 응용레벨 모바일 서버의 설계 및 구현)

  • Kim, Seonil;Jung, Jinman;Yoon, Young-Sun;Eun, Seongbae;So, Sun Sup;Cha, Shin
    • Journal of Korea Multimedia Society
    • /
    • v.21 no.3
    • /
    • pp.358-368
    • /
    • 2018
  • The mobile characteristics of the smart phone are well suited to on-the-site oriented services and are being utilized in a variety of ways. However, since most applications operate on a central server basis, Internet access is inevitable, and there are various problems such as an increase in server maintenance cost and security deterioration. Although researches have been proposed to utilize the smart phone itself as a server to improve it, these methods are based on downsizing the PC-based web server or modifying the smart phone kernel. These methods have the problems that a end user has to use the rooting, and they are not able to effectively utilize various communication means of a smart phone. In this paper, we propose a design and implementation of an application level smart phone web server. The server receives the document request from the remote via the Internet and in the local area using the WPAN. At this time, the web document is stored as an internal file structure of the smart phone application. We proposed the phttp protocol which uses server's phone number as ID for document request. Through the implementation, we analyzed the capacity and latency of stored data and its effectiveness is evaluated.

VLSI Design of an Improved Structure of a $GF(2^m)$ Divider (확장성에 유리한 병렬 알고리즘 방식에 기반한 $GF(2^m)$나눗셈기의 VLSI 설계)

  • Moon San-Gook
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.9 no.3
    • /
    • pp.633-637
    • /
    • 2005
  • In this contribution, we developed and improved an existing GF (Galois field) dividing algorithm by suggesting a novel architecture for a finite field divider, which is frequently required for the error correction applications and the security-related applications such as the Reed-Solomon code, elliptic curve encryption/ decryption, is proposed. We utilized the VHDL language to verify the design methodology, and implemented the architecture on an FPGA chip. We suggested the n-bit lookup table method to obtain the throughput of 2m/n cycles, where m is the order of the division polynomial and n is the number of the most significant lookup-bits. By doing this, we extracted the advantages in achieving both high-throughput and less cost of the gate areaon the chip. A pilot FPGA chip was implemented with the case of m=4, n=2. We successfully utilized the Altera's EP20K30ETC144-1 to exhibit the maximum operating clock frequency of 77 MHz.

Initial Sizing of General Aviation Aircraft Propelled by Electric Propulsion system (전기로 추진되는 일반 프로펠러 항공기의 초기 사이징)

  • Han, Hye-Sun;Shin, Kyo-Sic;Park, Hong-Ju;Hwang, Ho-Yon;Nam, Taewoo
    • Journal of the Korean Society for Aeronautical & Space Sciences
    • /
    • v.41 no.5
    • /
    • pp.391-403
    • /
    • 2013
  • Propeller aircraft propelled by an electric propulsion system is gaining a renewed interest because of ever-increasing environmental concern on harmful emissions emitted from conventional jet engines and national energy security. Traditional aircraft sizing methods are not readily applicable to electric propulsion aircraft that utilize a variety of alternative energy sources and power generation systems. This study showcases an electric propulsion aircraft sizing exercise based on a generalized, power based sizing method. A general aviation aircraft is propelled by an electric propulsion system that comprises of a propeller, a high temperature super conducting motor, a Proton Exchange Membrance(PEM) fuel cell system fuelled with hydrogen, and power conditioning equipment. In order to assess the impact of technology progression, aircraft sizing was conducted for two different sets of technology assumptions for electric components, and the results were compared with conventional baseline aircraft.

Design of Driving Record System using Block Chain (블록체인을 이용한 주행 기록 시스템 설계)

  • Seo, Eui-seong;Jang, Jong-wook
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.22 no.6
    • /
    • pp.916-921
    • /
    • 2018
  • Recently, interest in autonomous vehicle has increased, and autonomous driving capability is also increasing. Depending on the autonomous driving ability, the maximum number of steps is divided into 6 steps. The higher the step, the less the involvement of the person in the running, and the person does not need to be involved at the highest stage. Today's autonomous vehicles have been developed high level, but solutions are not clearly defined in case of an accident, so only the test run is possible. Such an accident occurring during traveling is almost inevitable, and it is judged who has made a mistake in case of an accident, which increases the punishment for the accident. Although a black box is used to clarify such a part, it is easy to delete a record, and it is difficult to solve an accident such as a hit-and-run. In this paper, i design a driving record system using black chain to solve accidents.

Design of Hash Processor for SHA-1, HAS-160, and Pseudo-Random Number Generator (SHA-1과 HAS-160과 의사 난수 발생기를 구현한 해쉬 프로세서 설계)

  • Jeon, Shin-Woo;Kim, Nam-Young;Jeong, Yong-Jin
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.27 no.1C
    • /
    • pp.112-121
    • /
    • 2002
  • In this paper, we present a design of a hash processor for data security systems. Two standard hash algorithms, Sha-1(American) and HAS-1600(Korean), are implemented on a single hash engine to support real time processing of the algorithms. The hash processor can also be used as a PRNG(Pseudo-random number generator) by utilizing SHA-1 hash iterations, which is being used in the Intel software library. Because both SHA-1 and HAS-160 have the same step operation, we could reduce hardware complexity by sharing the computation unit. Due to precomputation of message variables and two-stage pipelined structure, the critical path of the processor was shortened and overall performance was increased. We estimate performance of the hash processor about 624 Mbps for SHA-1 and HAS-160, and 195 Mbps for pseudo-random number generation, both at 100 MHz clock, based on Samsung 0.5um CMOS standard cell library. To our knowledge, this gives the best performance for processing the hash algorithms.

A Design of a Korean Programming Language Ensuring Run-Time Safety through Categorizing C Secure Coding Rules (C 시큐어 코딩 규칙 분류를 통한 실행 안전성을 보장하는 한글 언어 설계)

  • Kim, Yeoneo;Song, Jiwon;Woo, Gyun
    • Journal of KIISE
    • /
    • v.42 no.4
    • /
    • pp.487-495
    • /
    • 2015
  • Since most of information is computerized nowadays, it is extremely important to promote the security of the computerized information. However, the software itself can threaten the safety of information through many abusive methods enabled by coding mistakes. Even though the Secure Coding Guide has been proposed to promote the safety of information by fundamentally blocking the hacking methods, it is still hard to apply the techniques on other programming languages because the proposed coding guide is mainly written for C and Java programmers. In this paper, we reclassified the coding rules of the Secure Coding Guide to extend its applicability to programming languages in general. The specific coding guide adopted in this paper is the C Secure Coding Guide, announced by the Ministry of Government Administration and Home Affairs of Korea. According to the classification, we applied the rules of programming in Sprout, which is a newly proposed Korean programming language. The number of vulnerability rules that should be checked was decreased in Sprout by 52% compared to C.

A Study of Design for the Integrated Architecture of SOA and WOA (SOA와 WOA의 통합 아키텍처 설계에 관한 연구)

  • Park, So-Hyun;Yoo, Hae-Young
    • The KIPS Transactions:PartD
    • /
    • v.17D no.5
    • /
    • pp.317-326
    • /
    • 2010
  • Service Oriented Architecture (SOA), which supports various features such as interoperability and reusability of IT resources, comes into the spotlight as an effective approach for adapting new business environmental changes. SOA, however, has some problems including the high realization complexity and low Return on Investment (ROI). To solve these problems, Web Oriented Architecture (WOA) has gained attention. However, it also has some drawbacks about security concerns and unstable message transmissions. In this paper, we design a novel integrated architecture that classifies services into inside and outside ones and applies SOA for the former and WOA for the latter, respectively. By converging the advantages of SOA and WOA simultaneously, the proposed architecture becomes more simple and service-oriented, and can satisfy diverse requirements of customers. The usefulness evaluation of the proposed architecture is conducted through the Analytic Hierarchy Process (AHP) scheme.

A Study on the Cases of Merchandising and Suggestions for Improving Competitive Power of Traditional Liquor (전통주류 상품화 사례 및 경쟁력 제고 방안 연구)

  • Jun Young-Mi;Ahn Yoon-Su;Kim Mi-Hee
    • The Korean Journal of Community Living Science
    • /
    • v.17 no.2
    • /
    • pp.3-14
    • /
    • 2006
  • This study intends to offer suggestions for improving the security and competitive power of traditional liquors by investing in the status of intellectual property rights. Merchandising and the marketing strategies of traditional liquor are also addressed. The data was collected through a questionnaire survey given to 101 CEOs of traditional liquor manufacturers. The major results of this study were as follows: The management types of traditional liquor manufacturers were classified as the company 57 (56.4%), the corporation or the union 29 (28.7%), domestic industry 10 (9.9%), and marketing community or technology center 5 (5.0%). The competitive power degree of traditional liquor products was classified as strength 30 (31.6%), usual 30 (31.6%), weakness 35 (36.8%). The elements of strong competitive power were taste, functional (wellbeing) character, and attractiveness of the brand name. On the other side, reasons for weakness in competitive power were the marketing system, price competitiveness, and advertisement. The trademark registration of the traditional liquor appeared with 53%. The reasons not to pursue a trademark registration included the complicated and unnecessary process of registration acquisition, high registration expenses, etc. The perceptions of CEOs about the consumer's brand awareness for their product were low with an average 2.97. Explanations included insufficient advertisement and public relations, unrefined trademark design, and the meaninglessness of brand names. The marketing strategy of traditional liquor manufacturers according to annual sales were as follows: Manufacturers with high sales emphasized marketing strategies that focused on functional character, traditional image, high quality in image and package materials and design, high price strategies based on quality, and various sale promotions.

  • PDF

Design and Verification of Applied Public Information Based Authentication Protocol in the Message Security System (공개정보를 이용한 메시지 보안 시스템의 인증 프로토콜 설계 및 검증)

  • 김영수;신승중;최흥식
    • Journal of Korea Society of Industrial Information Systems
    • /
    • v.8 no.1
    • /
    • pp.43-54
    • /
    • 2003
  • E-Commerce, characterized by the exchange of message, occurs between individuals, organizations, or both. A critical promotion factor of e-Commerce is message authentication, the procedure that allows communicating parties to verify the received messages are authentic. It consists of message unforgery, message non-repudiation, message unalteration, and origin authentication. It is possible to perform message authentication by the use of public key encryption. PGP(Pretty Good Privacy) based on X.400 MHS(Message Handling System) and PKC(Public Key Cryptosystem) makes extensive use of message exchange. In this paper we propose, design and implement NMAP(New Message Authentication Protocol), an applied public information based encryption system to solve the message authentication problem inherent in public key encryption such as X.400 protocol and PGP protocol and were to cope with the verification of NMAP using fuzzy integral. This system is expected to be use in the promotion of the e-Commerce and can perform a non-interactive authentication service.

  • PDF