• Title/Summary/Keyword: Security element

Search Result 372, Processing Time 0.03 seconds

Study on security measures for protecting major national facilities using the wind corridor (바람길을 활용한 국가중요지역 안전대책 강구에 관한 연구)

  • Choi, Kee-Nam
    • Convergence Security Journal
    • /
    • v.11 no.5
    • /
    • pp.109-120
    • /
    • 2011
  • How meteorological situations have affected human life for survival have been an important element of living or military strategy throughout history. In modern society, overcrowding of cities has brought about many problems. Moreover, high-rise buildings and land cover have been causing abnormal weather conditions. The wind corridor, especially in urban areas has been flowing differently from the dominant weather condition of the surroundings. Therefore, the wind corridor in urban areas can be a main component in protecting major national facilities in urban areas from damage. Especially the wind corridor is a main factor to derive harm from poisonous substances in air. This paper seeks to find out the wind corridor in urban areas and the efficiency of that. In addition to that, it studies how to use the direction to protect major national facilities and areas from damage. It is considered that this study will be useful to make defence project, not only for preventing CBR(chemical, biological, and radiological) terrorism and violent assembly, but also for evacuation of people in case of big accidents or natural disasters.

Security Elevation of XML Document Using DTD Digital Signature (DTD 전자서명을 이용한 XML문서의 보안성 향상)

  • Park, Dou-Joon;Min, Hye-Lan;Lee, Joon
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • v.9 no.1
    • /
    • pp.1080-1083
    • /
    • 2005
  • Can speak that DTD is meta data that define meaning of expressed data on XML document. Therefore, in case DTD information is damaged this information to base security of XML document dangerous. Not that attach digital signature on XML document at send-receive process of XML document in this research, proposed method to attach digital signature to DTD. As reading DTD file to end first, do parsing, and store abstracted element or attribute entitys in hash table. Read hash table and achieve message digest if parsing is ended. Compose and create digital signature with individual key after achievement. When sign digital, problem that create entirely other digest cost because do not examine about order that change at message digest process is happened. This solved by method to create DTD's digital signature using DOM that can embody tree structure for standard structure and document.

  • PDF

A Study on RFID System for Accessing Multiple Objects Using Encrypted ID (암호화된 ID를 이용한 다중 객체 접근 방식의 RFID 시스템 연구)

  • Jung, Jong-Jin;Kim, Ji-Yeon
    • Journal of Korea Society of Industrial Information Systems
    • /
    • v.13 no.2
    • /
    • pp.80-87
    • /
    • 2008
  • RFID systems are being studied and developed in the area of the industry and marketplace. Recently RFID systems are core element of the ubiquitous technologies in individual life and industry. However, RFID systems often cause some serious problems such as violation of privacy and information security because their contactless devices communicate each other by radio frequency In this paper, we propose multiple objects RFID tag scheme including tag structure and authentication protocol. The proposed RFID tag structure maintains several object IDs of different applications in a tag memory. The tag structure allows those applications to access object IDs simultaneously. The authentication protocol for multiple objects tag is designed ta overcome the problems of security and privacy. The protocol has robustness against various attacks in low cost RFID systems. We evaluate the efficiency of proposed scheme and compare security of our scheme with several traditional schemes.

  • PDF

Study on the Methods of Security and Quality Evaluation of smart Healthcare System (스마트 헬스케어 시스템의 보안성 품질평가 방법에 대한 연구)

  • Yang, Hyo-Sik
    • Journal of Digital Convergence
    • /
    • v.15 no.11
    • /
    • pp.251-259
    • /
    • 2017
  • Recently, the smart healthcare industry that grafted the Internet of Things (IoT) onto the healthcare and medical services is being highlighted. Smart healthcare refers to the healthcare and medical services offered on the basis of information communication technologies including application, wearable devices and platforms, etc. The number of next generation smart healthcare devices are increasing in the smart healthcare industry through the combination of information technology (IT) and Bio Technology (BT), which are the most active areas among the 6T, which are the areas of the next generation industry. With the emergence of a diverse range of smart healthcare systems or devices, whether the smart healthcare system can be linked with other systems organically and the security and quality of the system have become important elements of evaluation. In this Study, the characteristics and service types of smart healthcare systems were examined, and the trends in the technology and industry of the smart healthcare system were analyzed. Moreover, this Study aims to develop the evaluation method for security and standards for quality evaluation by deducing the factors for the evaluation of smart healthcare system on the basis of the results of aforementioned examination. It is anticipated that this can induce improvement of quality and development of highly reliable products of a smart healthcare system, and will become the core technology to substitute the technology protection barrier.

Efficient Bit-Parallel Multiplier for Binary Field Defind by Equally-Spaced Irreducible Polynomials (Equally Spaced 기약다항식 기반의 효율적인 이진체 비트-병렬 곱셈기)

  • Lee, Ok-Suk;Chang, Nam-Su;Kim, Chang-Han;Hong, Seok-Hie
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.18 no.2
    • /
    • pp.3-10
    • /
    • 2008
  • The choice of basis for representation of element in $GF(2^m)$ affects the efficiency of a multiplier. Among them, a multiplier using redundant representation efficiently supports trade-off between the area complexity and the time complexity since it can quickly carry out modular reduction. So time of a previous multiplier using redundant representation is faster than time of multiplier using others basis. But, the weakness of one has a upper space complexity compared to multiplier using others basis. In this paper, we propose a new efficient multiplier with consideration that polynomial exponentiation operations are frequently used in cryptographic hardwares. The proposed multiplier is suitable fer left-to-right exponentiation environment and provides efficiency between time and area complexity. And so, it has both time delay of $T_A+({\lceil}{\log}_2m{\rceil})T_x$ and area complexity of (2m-1)(m+s). As a result, the proposed multiplier reduces $2(ms+s^2)$ compared to the previous multiplier using equally-spaced polynomials in area complexity. In addition, it reduces $T_A+({\lceil}{\log}_2m+s{\rceil})T_x$ to $T_A+({\lceil}{\log}_2m{\rceil})T_x$ in the time complexity.($T_A$:Time delay of one AND gate, $T_x$:Time delay of one XOR gate, m:Degree of equally spaced irreducible polynomial, s:spacing factor)

How to Generate Lightweight S-Boxes by Using AND Gate Accumulation (AND 연산자 축적을 통한 경량 S-boxes 생성방법)

  • Jeon, Yongjin;Kim, Jongsung
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.32 no.3
    • /
    • pp.465-475
    • /
    • 2022
  • Due to the impact of COVID-19, people are paying attention to convenience and health, and the use of IoT devices to help them is increasing. In order to embed a lightweight security element in IoT devices that need to handle sensitive information even with limited resources, the development of a lightweight S-box is essential. Until 2021, it was common to develop a lightweight 4-bit S-box by a heuristic method, and to develop an extended structure or repeat the same operation for a larger size lightweight S-box. However, in January 2022, a paper that proposed a heuristic algorithm to find an 8-bit S-box with better differential uniformity and linearity than the S-box generated with an MISTY extended structure, although non-bijective, was published [1]. The heuristic algorithm proposed in this paper generates an S-box by adding AND operations one by one. Whenever an AND operation is added, they use a method that pre-removes the S-box for which the calculated differential uniformity does not reach the desired criterion. In this paper, we improve the performance of this heuristic algorithm. By increasing the amount of pre-removal using not only differential uniformity but also other differential property, and adding a process of calculating linearity for pre-removing, it is possible to satisfy not only differential security but also linear security.

Applying an IPA(Importance-Performance Analysis) Model to Comparative Study on the Elementary School Students' Parents' Crime Prevention Design Element(CPTED) Awareness for Crime Prevention (범죄예방을 위한 초등학교 학부모의 범죄예방설계(CPTED)요소 인식에 관한 비교 연구: IPA(중요도-실행도 분석)기법을 중심으로)

  • Choi, Hyun-Sick
    • Korean Security Journal
    • /
    • no.40
    • /
    • pp.209-242
    • /
    • 2014
  • This study is to understand sure the primary crime prevention has been incidence as a social problem intended for parents through the analysis of the Crime Prevention Design (CPTED) CPTED element of recognize elements that target crime prevention strategy to effectively help students be and an object of the present invention is to provide a policy suggestion haryeoneunde proposed basic data required for orientation. To achieve the study objectives such as the core framework in this study IPA: Importance-Performance Analysis) also was selected. Subjects of study in 2010 Gyeongju Elementary parents name and were 203 first research group investigating the secondary school population of the region in 2014 to nomadic parents of 297 people sampled selection. Questionnaire that use by this study applies "Important-Performance Analysis : IPA" technique that Martilla & James(1977) presented and analyzed awareness for CPTED elements of strategy for student's crime prevention to elementary school pupil students' parentse. It was the first group, 0.886, 0.920, 0.895 and 2nd group 0.880, 0.906, 0.878 that reliability of (Cronbach' s ${\alpha}$) the importance, and believability of run chart was the first group, 0.880, 0.917, 0.878 and 2nd group, 0.735, 0.840, 0.830. Analysis of the data carried out frequency analysis, reliability analysis, Frequency analysis was performed, paired sample t-Test for the reliability analysis, and the technical statistical analysis of the data is. The analysis of lattice bars execution through the IPA, the importance of the primary parents elements of CPTED strategies are generally very high, but found that the variation depending on the components that Performance. This study, an important element of the strategy to eliminate the school building for students from inside and outside the criminal fears CPTED is a mechanical surveillance in the first group, organizational surveillance, and the second group is the region intensified I'll showed mechanically and organizational factors in the investigation, and request that the investment is urgently important element is also execution low, crime prevention personnel security higher importance than expanding the front door. The analysis result of this study expects that basic data can be used in policy direction presentation that examines closely CPTED elements of strategy for crime prevention of students and applies CPTED's component effectively at elementary school hereafter.

  • PDF

Reproduction of Cyclic Triaxial Behavior of Unsaturated Soil using Element Simulation (요소 시뮬레이션에 의한 불포화토의 반복삼축거동 재현)

  • Lee, Chungwon
    • Journal of the Korean GEO-environmental Society
    • /
    • v.16 no.10
    • /
    • pp.5-14
    • /
    • 2015
  • Suction affects the unsaturated soil as the negative pore pressure, and leads to increases of the yield stress and the plastic shear stiffness of the soil skeleton due to the growth in interparticle stress. Hence, in this study, in order to account for these effects of suction under the dynamic loading condition such as the earthquake, the element simulation of the cyclic triaxial test using induced stress-strain relation based on cyclic elasto-plastic constitutive model extended for unsaturated soil considering the $1^{st}$ and the $2^{nd}$ yield functions was conducted. Through the stress path, stress-strain relation and relation between volumetric strain and axial strain, it was seen in all the cases that the simulation results demonstrated a good agreement with the experimental results. It is expected that the results of this study possibly contribute to the accuracy improvement on the prediction of unsaturated soil behavior under the dynamic loading condition.

A Investigation study on the evaluation of evacuation capacity for egress safety deign in Korea(III) (국내 PBD기반 피난안전설계를 위한 피난용량 산정에 관한 연구(III) - 수평적 군집피난속도식의 제안 -)

  • Seo, Dong-Goo;Hwang, Eun-Kyung;Hwang, Keum-Suk;Kwon, Young-Jin
    • Proceedings of the Korea Institute of Fire Science and Engineering Conference
    • /
    • 2008.11a
    • /
    • pp.334-339
    • /
    • 2008
  • Recently the consideration for occupant's security has been raised as very important design element from the fire by building's large sized, higher storied, and its compounded. But the domestic laws regulated the predicative laws according to the technical standard which has no difference from the past domestic evacuation regulation. Therefore, regulation of escape code and developing technology for Korean conditions are needed to reduce victims during disaster by protecting occupant and guiding people to safe places.

  • PDF

A Study on the Escape capacity for Evacuation safety Design of PBD foothold in Korea(I) (국내 PBD기반 피난안전설계를 위한 피난용량 산정에 관한 연구(I) - 국내외 피난용량 산정방안의 비교 -)

  • Seo, Dong-Goo;Hwang, Eun-Kyung;Hwang, Keum-Suk;Kwon, Young-Jin
    • Proceedings of the Korea Institute of Fire Science and Engineering Conference
    • /
    • 2008.11a
    • /
    • pp.340-347
    • /
    • 2008
  • Recently the consideration for occupant's security has been raised as very important design element from the fire by building's large sized, higher storied, and its compounded. But the domestic laws regulated the predicative laws according to the technical standard which has no difference from the past domestic evacuation regulation. Therefore, regulation of escape code and developing technology for Korean conditions are needed to reduce victims during disaster by protecting occupant and guiding people to safe places.

  • PDF