• Title/Summary/Keyword: Security design

Search Result 3,411, Processing Time 0.028 seconds

An Energy- Efficient Optimal multi-dimensional location, Key and Trust Management Based Secure Routing Protocol for Wireless Sensor Network

  • Mercy, S.Sudha;Mathana, J.M.;Jasmine, J.S.Leena
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.15 no.10
    • /
    • pp.3834-3857
    • /
    • 2021
  • The design of cluster-based routing protocols is necessary for Wireless Sensor Networks (WSN). But, due to the lack of features, the traditional methods face issues, especially on unbalanced energy consumption of routing protocol. This work focuses on enhancing the security and energy efficiency of the system by proposing Energy Efficient Based Secure Routing Protocol (EESRP) which integrates trust management, optimization algorithm and key management. Initially, the locations of the deployed nodes are calculated along with their trust values. Here, packet transfer is maintained securely by compiling a Digital Signature Algorithm (DSA) and Elliptic Curve Cryptography (ECC) approach. Finally, trust, key, location and energy parameters are incorporated in Particle Swarm Optimization (PSO) and meta-heuristic based Harmony Search (HS) method to find the secure shortest path. Our results show that the energy consumption of the proposed approach is 1.06mJ during the transmission mode, and 8.69 mJ during the receive mode which is lower than the existing approaches. The average throughput and the average PDR for the attacks are also high with 72 and 62.5 respectively. The significance of the research is its ability to improve the performance metrics of existing work by combining the advantages of different approaches. After simulating the model, the results have been validated with conventional methods with respect to the number of live nodes, energy efficiency, network lifetime, packet loss rate, scalability, and energy consumption of routing protocol.

Test Standard for Reliability of Automotive Semiconductors: AEC-Q100 (자동차 반도체의 신뢰성 테스트 표준: AEC-Q100)

  • Lee, Seongsoo
    • Journal of IKEEE
    • /
    • v.25 no.3
    • /
    • pp.578-583
    • /
    • 2021
  • This paper describes acceleration tests for reliability of semiconductors. It also describes AEC-Q100, international test standard for reliability of automotive semiconductors. Semiconductors can be used for dozens of years. So acceleration tests are essential to test potential problems over whole period of product where test time is minimized by applying intensive stresses. AEC-Q100 is a typical acceleration test in automotive semiconductors, and it is designed to find various failures in semiconductors and to analyze their causes of occurance. So it finds many problems in design and fabrication as well as it predicts lifetime and reliability of semiconductors. AEC-Q100 consists of 7 test groups such as accelerated environmental stress tests, accelerated lifetime simulation tests, package assembly integrity tests, die fabrication reliability tests, electrical verification tests, defect screening tests, and cavity package integrity tests. It has 4 grades from grade 0 to grade 3 based on operational temperature. AEC-Q101, Q102, Q103, Q104, and Q200 are applied to discrete semiconductors, optoelectronic semiconductors, sensors, multichip modules, and passive components, respectively.

Development of Camera System Board Using ARM (ARM을 이용한 카메라 시스템 보드 개발에 관한 연구)

  • Choi, Young-Gyu
    • The Journal of Korea Institute of Information, Electronics, and Communication Technology
    • /
    • v.11 no.6
    • /
    • pp.664-670
    • /
    • 2018
  • In modern society, CCTV, which is the eye of surveillance, is being used to collect image data in various ways in daily life. CCTV is used not only for security, surveillance, and crime prevention but also in many fields such as automobile and black box. In this paper, we have developed a STM32F407 ARM chip based camera system for various applications. In order to develop camera system, modeling of camera system based on 3D structure was carried out in SolidWorks environment. The PCB board design was developed to extract the PCB parts from the camera system modeling files into iges files, convert them from the Altium Designer tool into 3D and 2D boards, After designing the camera system circuit and PCB, we have been studying the implementation of the stable system by using TRM (Thermal Risk Management) tool to cope with the heat simulation generated on the board.

Design of the Personalized User Authentication Systems (개인 맞춤형 사용자 인증 시스템 설계)

  • Kim, Seong-Ryeol
    • Journal of Convergence for Information Technology
    • /
    • v.8 no.6
    • /
    • pp.143-148
    • /
    • 2018
  • In this paper, we propose a personalized user authentication system (PUAS) that can be used in multiple stages in user authentication by customizing the password keyword to be used in user authentication. The proposal concept is that the user oneself defines the password keyword to be used in user authentication so as to cope with a passive retransmission attack which reuses the password obtained when the server system is accessed in user authentication. The authentication phase is also designed so that it can be expanded in multiple stages in a single step. Also, it is designed to store user-defined password related information in an arbitrary encrypted place in the system, thereby designing to disable the illegal access of the network. Therefore, even if an intruder accesses the system using the proposed system, it is possible to generate personal authentication information by generating a password keyword through unique personal information possessed only by an individual and not know the place where the generated authentication information is stored, It has a strong security characteristic.

A Study on Service Quality Satisfaction of Delivery Food App. of Korean and Chinese Customer (배달음식 앱의 서비스 품질 만족에 관한 연구 - 한국과 중국 소비자를 대상으로 -)

  • Hwang, Yuns-Sung;Park, Jae-kei;Wang, Yan;Seo, Yong-Mo;Rhee, Byungchae
    • Journal of the Korea Convergence Society
    • /
    • v.9 no.12
    • /
    • pp.239-250
    • /
    • 2018
  • This study focus on analyzing the factors which influence the customer satisfaction of food delivery application and its degree of the influence on the quality satisfaction both with Korean and Chinese customers. For this purpose, the model of hypothetical structure was established through the mobile internet service quality measurement was called as MOBISQUAL. As a result, the Korean customers was confirmed that the fulfillment and playfulness as the subdimension of outcome quality both have a positive effect on customer satisfaction. And the Chinese customer was confirmed that the playfulness of outcome quality, personalization of contextual interaction, design, ease of use and security of servicescape quality affected customer satisfaction positively.

Factors Affecting the Usage of Face Recognition Payment Service (얼굴인식 결제서비스 이용에 영향을 미치는 요인)

  • Zhang, Yi Ning;Ma, Jian;Park, Hyun Jung
    • The Journal of the Korea Contents Association
    • /
    • v.19 no.8
    • /
    • pp.490-499
    • /
    • 2019
  • Face recognition payment service is an innovative payment method based on face recognition technology and is emerging in China now. Various industries regarding unmanned sales are likely to utilize this face recognition payment service in the future. This study investigated the factors influencing the usage intention of Chinese consumers who have experience using face recognition service. We used questionnaire survey and analysis with SPSS and AMOS. According to the results of the study, conclusions are as followed. First, consumers' attitudes toward the characteristic of face recognition payment service, which are non-contact and non-coercion, positively affected perceived usefulness. Second, the rapidness of the facial recognition payment among the recognition, the security and the rapidness of this service affected the ease of use. Third, social influences such as subjective norms also influence the intention to use. Fourth, the increase of the level of self-expression awareness and the intention of using face recognition payment service are confirmed. Through these results, the implications for design and communication of related innovative services were discussed.

The Design of a High-Performance RC4 Cipher Hardware using Clusters (클러스터를 이용한 고성능 RC4 암호화 하드웨어 설계)

  • Lee, Kyu-Hee
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.23 no.7
    • /
    • pp.875-880
    • /
    • 2019
  • A RC4 stream cipher is widely used for security applications such as IEEE 802.11 WEP, IEEE 802.11i TKIP and so on, because it can be simply implemented to dedicated circuits and achieve a high-speed encryption. RC4 is also used for systems with limited resources like IoT, but there are performance limitations. RC4 consists of two stages, KSA and PRGA. KSA performs initialization and randomization of S-box and K-box and PRGA produces cipher texts using the randomized S-box. In this paper, we initialize the S-box and K-box in the randomization of the KSA stage to reduce the initialization delay. In the randomization, we use clusters to process swap operation between elements of S-box in parallel and can generate two cipher texts per clock. The proposed RC4 cipher hardware can initialize S-box and K-box without any delay and achieves about 2 times to 6 times improvement in KSA randomization and key stream generation.

Intrusion Situation Classification Model for Intelligent Intrusion Awareness (지능적인 침입 인지를 위한 침입 상황 분류 모델)

  • Hwang, Yoon-Cheol;Mun, Hyung-Jin
    • Journal of Convergence for Information Technology
    • /
    • v.9 no.3
    • /
    • pp.134-139
    • /
    • 2019
  • As the development of modern society progresses rapidly, the technologies of society as a whole are progressing and becoming more advanced. Especially in the field of security, more sophisticated and intelligent attacks are being created. Meanwhile, damaging situations are becoming several times larger than before Therefore, it is necessary to re-classify and enhance the existing classification system. It is required to minimize the intrusion damage by actively responding to intelligent intrusions by applying this classification scheme to currently operating intrusion detection systems. In this paper, we analyze the intrusion type caused by intelligent attack We propose a new classification scheme for intrusion situations to guarantee the service safety, reliability, and availability of the target system, We use this classification model to lay the foundations for the design and implementation of a smart intrusion cognitive system capable of early detection of intrusion, the damages caused by intrusion, and more collections active response.

A Study on DDS (Data Distribution Service) Application for Real-time Monitoring and Control in Operation Console of the Railway Safety Control Platform (철도 안전관제 통합콘솔에서의 실시간 감시 및 통제를 위한 DDS 적용방안 연구)

  • So, Jaegeol;Shin, Kwang-Ho;Ahn, Jin
    • Journal of The Korean Society For Urban Railway
    • /
    • v.6 no.4
    • /
    • pp.279-286
    • /
    • 2018
  • Recently, a safety control platform to monitor the safety of train operation in real time and prevent accidents and risks through control is under study. In the initial design, DDS communication method supporting distributed network is adopted for real-time processing of large amount of data according to the integration of existing distributed safety data. However, communication between server and console inside the safety control platform is applied to existing TCP socket communication. In the case of TCP socket communication, it is possible to process data for a small system of a safety control test bed by one-to-one communication. However, if the data is expanded all over the country in the future, it becomes difficult to cope with a case where communication traffic occurs due to vast amount of data. In this paper, we propose DDS communication method to support distributed network between server and console of security control platform, and demonstrate TCP socket and DDS method, and compare throughput and speed. As a result, we have found that the scalability and flexibility are improved in case of applying DDS communication to future systems.

Topic and Survey Methodological Trends in 'The Journal of Information Systems' ('정보시스템연구'의 연구주제와 서베이 방법론 동향분석)

  • Ryoo, Sung-Yul;Park, Sang-Cheol
    • The Journal of Information Systems
    • /
    • v.27 no.4
    • /
    • pp.1-33
    • /
    • 2018
  • Purpose The purpose of this study is to review topic and survey methodological trends in 'The Journal of Information Systems' in order to present the practical guidelines for the future IS research. By attempting to conduct a meta-analysis on both topic and survey methodological trends, this study could provide researchers wishing to pursue this line of work further with what can be done to improve IS disciplines. Design/methodology/approach In this study, we have reviewed 185 papers that were published in 'The Journal of Information Systems' from 2010 to 2018 and classified them based on topics studied and survey methodologies used. The classification guidelines, which was developed by Palvia et al.(2015), has been used to capture the topic trends. We have also employed Struab et al.(2004)s' guidelines for securing rigor of validation issues. By using two guidelines, this study could also present topic and rigor trends in 'The Journal of Information Systems' and compare them to those trends in International Journals. Findings Our findings have identified dominant research topics in 'The Journal of Information Systems'; 1) social media and social computing, 2) IS usage and adoption, 3) mobile computing, 4) electronic commerce/business, 5) security and privacy, 6) supply chain management, 7) innovation, 8) knowledge management, and 9) IS management and planning. This study also could offer researchers who pursue this line of work further practical guidelines on mandatory (convergent and discriminant validity, reliability, and statistical conclusion validity), highly recommended (common method bias testing), and optional validations (measurement invariance testing for subgroup analysis, bootstrapping methods for testing mediating effects).