• Title/Summary/Keyword: Security design

Search Result 3,411, Processing Time 0.036 seconds

Orbit Design of a Korean Regional Communication & Navigation Satellite System (한국형 지역 위성 통신항법시스템의 위성 궤도설계에 관한 연구)

  • Lee, Sang-Hyun;Park, Byung-Woon;Kim, Do-Yoon;Kee, Chang-Don;Paik, Bok-Soo;Lee, Ki-Hoon
    • Journal of the Korean Society for Aeronautical & Space Sciences
    • /
    • v.33 no.7
    • /
    • pp.51-58
    • /
    • 2005
  • In 1990, GPS which had been developed for the military purposes became available to the civilian community. Since then these satellite navigation systems have been used extensively in the industrial areas such as car navigation, airplanes, communications, science and surveying. If we are dependent on GPS, however, there are some foreseeable problems in the areas of national security and sovereignty. Current GPS satellite constellation provides limited performance for the country like Korea and Japan where mountain area and urban canyon do not allow the wide skyline. To solve these problems, many countries plan to make other alternative navigation systems.In this paper, RNSS(Regional Navigation Satellite System) is designed to provide communication service with high elevation angle. It is shown, that system does not only have good navigation performance, but also improve GPS performance in Korea and its neighboring areas.

Authentication of Hierarchical Mobile IPv6 Handover Using Modified Return Rotability (Modified Return Routability를 이용한 Hierarchical Mobile IPv6 Handover 인증 기법)

  • Kim, Jung-Hwan;Yu, Ki-Sung;Park, Byung-Yeon;Noh, Min-Ki;Mun, Young-Song
    • Journal of Internet Computing and Services
    • /
    • v.8 no.6
    • /
    • pp.21-28
    • /
    • 2007
  • Hierarchical Mobile IPv6 improves performance of Mobile IPv6 by managing Binding Update in terms of location, With improved handover delay, realization of delay-sensitive services (e,g, VoIP or video streaming) has become more persuadable, Comparing with Mobile IPv6, however, Hierarchical Mobile IPv6 brings security threats related to Local Binding Update to mobile network, In the RFC 4140, specific methods to authenticate Local Binding Update message are not explicitly presented. It is essential that design secure architecture to address problems related to authenticating Local Binding Update, Many secure suggestions for Local Binding Update, however, concentrate on infrastructure-based solutions such as AAA PKI. These approaches may cause scalability problem when the suggested solutions are applied to real network. Therefore we suggest authentication method that doesn't require infrastructure, In addition to authentication of Local Binding Update, our method also provides mobile node with power saving ability.

  • PDF

Draft Design of DataLake Framework based on Abyss Storage Cluster (Abyss Storage Cluster 기반의 DataLake Framework의 설계)

  • Cha, ByungRae;Park, Sun;Shin, Byeong-Chun;Kim, JongWon
    • Smart Media Journal
    • /
    • v.7 no.1
    • /
    • pp.9-15
    • /
    • 2018
  • As an organization or organization grows in size, many different types of data are being generated in different systems. There is a need for a way to improve efficiency by processing data smarter in different systems. Just like DataLake, we are creating a single domain model that accurately describes the data and can represent the most important data for the entire business. In order to realize the benefits of a DataLake, it is import to know how a DataLake may be expected to work and what components architecturally may help to build a fully functional DataLake. DataLake components have a life cycle according to the data flow. And while th data flows into a DataLake from the point of acquisition, its meta-data is captured and managed along with data traceability, data lineage, and security aspects based on data sensitivity across its life cycle. According to this reason, we have designed the DataLake Framework based on Abyss Storage Cluster.

A Design and Development of Secure-Coding Check System Based on E-Government Standard Framework for Convergence E-Government Service (융복합 전자정부 서비스를 위한 전자정부 표준프레임워크 기반 시큐어코딩 점검 시스템 설계 및 개발)

  • Kim, Hyungjoo;Kang, Jungho;Kim, Kyounghun;Lee, Jaeseung;Jun, Moonseog
    • Journal of Digital Convergence
    • /
    • v.13 no.3
    • /
    • pp.201-208
    • /
    • 2015
  • Recently computer, smart phone, medical devices, etc has become used in a variety of environments as the application fields of IT products have become diversification. Attack case of abuse of software security vulnerabilities is on the increase as the application fields of software have become diversification. Accordingly, secure coding program is of a varied but history management, updating, API module to be vulnerable to attack. Thus, this paper proposed a materialization of CMS linked system to enable check the vulnerability of the source code to content unit for secure software development, configuration management system that interwork on the transmission module. Implemented an efficient coding system secure way that departmentalized by the function of the program and by analyzing and applying secure coding standards.

Design of Image Tracking System Using Location Determination Technology (위치 측위 기술을 이용한 영상 추적 시스템 설계)

  • Kim, Bong-Hyun
    • Journal of Digital Convergence
    • /
    • v.14 no.11
    • /
    • pp.143-148
    • /
    • 2016
  • There is increasing concern about security as a need for increased safety in the information industry society. However, it does not meet the needs for safety including CCTV. Therefore, in this paper, we link the processing technology using the image information to the IPS system consisting of GPS and Beacon. It designed a conventional RFID tag attached discomfort and image tracking system is limited to complement the disadvantages identifiable area. To this end, we designed a smart device and the Internet of Things convergence system and a research to ensure the accuracy and reliability of the IPS of the access control system. Finally, by leveraging intelligent video information using a PTZ camera, and set the entrant management policies it was carried out to control the situation and control. Also, by designing the integrated video tracking system, an authentication server, visualization systems were designed to establish an efficient technique for analyzing the IPS entrant behavior patterns.

A Study on Real IP Traceback and Forensic Data Generation against Bypass Attack (우회적인 공격에 대한 실제 IP 역추적 실시와 포렌식 자료 생성)

  • Youn, Byung-Sun;Yang, Hae-Sool;Kim, Dong-Jhoon
    • Journal of the Korea Society of Computer and Information
    • /
    • v.13 no.1
    • /
    • pp.143-151
    • /
    • 2008
  • Execute IP traceback at this paper as target an intruder's attacking that Bypass Attack in order to avoid an exposure of own Real IP address Design IP traceback server and agent module, and install in Internet network system for Real IP traceback. Set up detection and chase range aggressive loop around connection arbitrariness, and attack in practice, and generate Real IP data cut off by fatal attacks after data and intrusion detection accessed general IP, and store to DB. Generate the Forensic data which Real IP confirms substance by Whois service, and ensured integrity and the reliability that buy to early legal proof data, and was devoted to of an invader Present the cyber criminal preventive effect that is dysfunction of Ubiquitous Information Society and an effective Real IP traceback system, and ensure a Forensic data generation basis regarding a judge's robe penalty through this paper study.

  • PDF

A Study on Informational(IT) Integration Model for Efficiency of National Police Agency Business (경찰청 업무의 효율성을 위한 정보화(IT) 통합 모델 연구)

  • Shin, Sung-Choul;Yang, Hae-Sool
    • Journal of the Korea Society of Computer and Information
    • /
    • v.13 no.1
    • /
    • pp.203-212
    • /
    • 2008
  • Currently the problem that cannot attempt convenience anger to inner user and people has been stated in a National Police Agency(NPA) informatization system administered Executed an inquiry regarding users inner the our country NPA after analyzing Hint point a foreign NPA IT informatization organization decreasing by and analyzed improvement Point to measures regarding this problem at these papers, and derived from an efficient strategic plan for NPA informatization integration. As set up informatization vision of NPA and a goal, To utilize so that design a model integrated inforrnatization for advanced a business assistance system of the NPA where these results are objective for the people enhancement, and keep connection with other organization in its mind, and can accomplish a quality elevation of NPA information business. and expect as present improvement plan for efficiency of NPA information business.

  • PDF

Construction Schemes of GIS-based Integrated Water Environment Information Management System Linked with Korean Reach File (KRF를 연계한 GIS기반의 통합 물환경정보 관리시스템 구축 방안)

  • Lee, Chol Young;Kim, Kye Hyun;Park, Yong Gil;Lee, Hyuk
    • Journal of Korean Society on Water Environment
    • /
    • v.30 no.2
    • /
    • pp.226-241
    • /
    • 2014
  • This study proposes schemes of GIS-based system development for integrated information management in water environment linked with Korean Reach File (KRF). For this purpose, precedent studies and systems of the U.S. were investigated and analyzed to induce optimal methodology for Korean circumstances. Thereafter, data linkage methods of KRF and Water Environment Information System (WEIS), system configuration plans, application development plans, and KRF improvement and maintenance plans were considered. For data linkage and system configuration, three methods were suggested: an overlay operation-based data linkage method, entering spatial addresses into the existing DB, and creating link information between KRF and the existing DB. The first method was predicted to be the most effective for system implementation, the second method is advantageous for search tasks, and the third method is advantageous for system security and maintenance. Various types of applications should be developed in the consideration of the types of the users and their usages. Moreover, there is a need for further research on regular renewal of KRF, standard development, expansion of construction areas, etc. Based on the present results, research on actual system design and development also should be conducted for supporting Total Maximum Daily Loads (TMDLs).

An Exploration of Factor's of Service Quality influencing at User's Satisfaction and Distribution Channel of the Digital Contents (디지털 콘텐츠 사용자의 만족에 영향을 주는 서비스 품질 요인 및 유통 채널 탐색에 관한 연구)

  • Suh, Jung Han;Bae, Soonh Han;Kim, Young Gook;Choi, Jae Young
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.7 no.4
    • /
    • pp.183-198
    • /
    • 2011
  • With the recent development of IT technology, the existing contents have been digitalized through various distribution channels. Accordingly, a lot of studies have been done in order to figure out the distribution and features of digital contents, In these studies, however, categorical characteristics of digital contents were not considered ; most of the previous researchers saw digital contents as only a single item or focused on some contents within particular part such as movie, music, etc. So, this study divides digital contents into movies, music and texts. I was going to study which factors affect Customer Satisfaction in relation with the kind of contents. With SERVQUAL as independent variables, which affect the Customer satisfaction, I used five factors :Design Quality, Information Quality, Security Quality, Communication Quality and Transaction Quality. As for the detailed items, I corrected them with Open-End Question and Pre Survey Research, which are more fit into the features of digital contents. This research conducted Principle Component Analysis, Reliability Test, Correlation Analysis and Regression Analysis. I verified that each factor of Service Qualities has a positive effect on Customer Satisfaction. Moreover, the factors of the effect are different according to the kind of digital contents. This paper was added Exploratory Study to find the best distribute channel. For the study, I search the possible distribute channel in each digital contents and their characteristic.

The Research of the Analysis of Movement from a Fire using RTLS System (RTLS 시스템을 활용한 화재시 행동분석 연구)

  • Lim, Kyung-Bum;Kim, Ha-Young;Rie, Dong-Ho
    • Fire Science and Engineering
    • /
    • v.24 no.4
    • /
    • pp.98-103
    • /
    • 2010
  • The design disaster prevention of first consideration is security for the people in the buildings. However, it is difficult to make a project for considering variable cases, declined visibility of smoke, distance from another person, mentality, knowledge of clearway etc. This study purpose is, analysis variable cases and modularization of pattern movement to practice basic information for evacuation of simulation which is used RTLS (Real Time Location System) system. It is useful to sense the electric waves from the Tag and grasp the real-time position. The pattern movement of evacuation were analyzed prescription eyeglasses which is used RTLS system to consider following 3 actions; analysis of relations that declined visibility effect the decline of movement velocity, analysis rate of flow with the size of door to estimate the optimum size of door in building and analysis the pattern movement that a bottleneck situation with abundant of people passed together to these exit. The confirmed of propriety of the interpretation about the actual people to evacuate is expected applying the numerical formula in various situation.