• Title/Summary/Keyword: Space Security

Search Result 971, Processing Time 0.032 seconds

Analysis of Security Technology for Internet of things (사물인터넷 보안 기술 분석)

  • Lee, Ho-Tae
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.17 no.4
    • /
    • pp.43-48
    • /
    • 2017
  • Today our society is approaching new intelligence information society, which has been caused by the Fourth Industrial Revolution along with the development of information and communication technology(ICT). And this has just opened a new era of Internet of Things(IoT) that connects between human and objects and between objects through network, allowing transmission and reception of information beyond the limits of space. However, many crises occurred in the existing communication environment may threaten the security of Internet of Things, by violating the three components of information security. In this paper, this study aims to analyze security technology to achieve advanced security by dividing IoT security technology for coping with security vulnerability found in different components into three groups.

Low Power Security Architecture for the Internet of Things (사물인터넷을 위한 저전력 보안 아키텍쳐)

  • Yun, Sun-woo;Park, Na-eun;Lee, Il-gu
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2021.10a
    • /
    • pp.199-201
    • /
    • 2021
  • The Internet of Things (IoT) is a technology that can organically connect people and things without time and space constraints by using communication network technology and sensors, and transmit and receive data in real time. The IoT used in all industrial fields has limitations in terms of storage allocation, such as device size, memory capacity, and data transmission performance, so it is important to manage power consumption to effectively utilize the limited battery capacity. In the prior research, there is a problem in that security is deteriorated instead of improving power efficiency by lightening the security algorithm of the encryption module. In this study, we proposes a low-power security architecture that can utilize high-performance security algorithms in the IoT environment. This can provide high security and power efficiency by using relatively complex security modules in low-power environments by executing security modules only when threat detection is required based on inspection results.

  • PDF

A Study on the Meaning and Choice Factors of Housing by University Student (대학생의 주거의미 및 주거선택시 고려요인에 관한 연구)

  • Shin, Hwa-Kyung;Jo, In-Sook
    • Korean Journal of Human Ecology
    • /
    • v.23 no.5
    • /
    • pp.957-968
    • /
    • 2014
  • The purpose of the study was to find out the meaning of housing and choice factors of housing of the university students. The snowballing method was used to collect the data for analysis. The data were collected from April 4th to 14, 2013, and the sample consisted of 122 university students and 40 pairs of university students and their parents in Seoul. It was examined the meaning of housing and choice factors by university students. The finding of this study was as follows: 1) The meaning of housing was composed of 9types : 'Family harmony space', 'Emotional space', 'Social status space', 'Life space', 'Social relations space', 'Economic space', 'Perform the role space', 'Physical safety space' and 'Privacy space'. 2) The choice factors of housing were composed of 7types : 'Social status', 'Life with Neighborhood', 'Safety and security', 'Transportation and education', 'Ease of use of facilities', 'Economic' and 'Environment'.

Investigating the Relationship Between Accessibility of Green Space and Adult Obesity Rates: A Secondary Data Analysis in the United States

  • Kim, Junhyoung;Lee, Sujung;Ramos, William
    • Journal of Preventive Medicine and Public Health
    • /
    • v.54 no.3
    • /
    • pp.208-217
    • /
    • 2021
  • Objectives: In spite of the importance of green space for reducing obesity-related problems, there has been little exploration of whether access to green space (e.g., parks and recreational facilities) influences the obesity rate of adults in the United States. The purpose of the study was to investigate the relationships among accessibility of green space, obesity rates, and socioeconomic and demographic variables among adults living in the State of Indiana, United States. Methods: We conducted a secondary data analysis to investigate the relationships among accessibility to green space, obesity rates, and socio-demographic variables with employing Geographic Information System in order to measure the accessibility of green space. Results: This study found that accessibility of green space served as a strong predictor of reduced obesity rates among adults (β=-2.478; p<0.10). In addition, adults with higher education levels, as well as better access to green space, were found to have even lower obesity rates (β=-0.188; p<0.05). Other control variables such as unemployment rates, food security, and physical inactivity are additional factors that influence obesity rates among adults. Conclusions: Accessibility of green space may play an important role in facilitating physical activity participation and reducing obesity rates.

Design and Implementation of Virtual and Invisible Private Disk (VIPDISK) having Secure Storage Device (보안 저장장치를 구비한 가상의 인비저블한 보안 디스크 (VIPDISK) 설계 및 구현)

  • Quan, Shan Guo;Kwon, Yong-Gu
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.25 no.4
    • /
    • pp.781-792
    • /
    • 2015
  • This paper proposes a virtual and invisible private disk (VIPDISK) technology equipped with the secure storage devices. As a software based security technology, it can create hidden partitions on any data storage device which can not be identified by the windows OS, so the program running on it, does not have any evidence of the existence of the hidden storage space. Under inactive state, it maintains an unexposed secure partition which can only be activated with a matching combination of a unique digital key and a user password to open the decryption tool. In addition, VIPDISK can store data to secure storage device with real-time encryption, it is worry-free even in the case of lost or theft. Simulation results show that VIPDISK provides a much higher level of security compared to other existing schemes.

Design of YK2 Cipher Algorithm for Electronic Commerce Security (전자상거래 보안을 위한 YK2 암호 알고리즘 설계)

  • Kang, Young-Ku;Rhew, Sung-Yul
    • The Transactions of the Korea Information Processing Society
    • /
    • v.7 no.10
    • /
    • pp.3138-3147
    • /
    • 2000
  • EC(Electronic Commerce) which is cone the virtual space through Internet, has the advantage of time and space. On the contrary, it also has weak point like security probelm because anybody can easily access to the system due to open network attribute of Internet. Theretore, we need the solutions that protect the EC security problem for safe and useful EC activity. One of these solution is the implemonlation of a strong cipher algorithm. YK2(YoungKu Kang) cipher algorithm proposed in this paper is advantage for the EC security and it overcomes the limit of the current 6/1 bits block cipher algorithm using 128 bits key length for input, output, encryption key and 32 rounds. Moreover, it is degigned for the increase of time complexity and probability calculation by adapting more complex design for key scheduling regarded as one of the important element effected to enciyption.

  • PDF

Design and Implementation of Visual Filtering for Integrated Underground Map Security (보안을 고려한 지하공간통합지도의 가시화 필터링 설계)

  • Kim, Yong Tae;Park, Chan Seob
    • Journal of the Korean Society of Surveying, Geodesy, Photogrammetry and Cartography
    • /
    • v.39 no.6
    • /
    • pp.477-482
    • /
    • 2021
  • The integrated underground space map system provides information on infrastructure that requires security, but to prevent rupture accidents during excavation work at the underground construction site, it must provide information on all underground facilities on the site. Providing additional information other than the object of interest to the user is a factor that increases the risk of information leakage of security data. In this paper, we design the visualization filtering method that when visualizing the integrated underground space map in the field, the visualization of entire underground facilities of interest to workers is performed, but visualization of other underground facilities is minimized to minimize the risk of security data information leakage. To this end, a visualization area of a certain distance for each of the underground facilities of interest was created, and an integrated visualization filter was created with spatial union operation. When the integrated underground map is output on the screen, only the objects located within the filter area are visualized using the generated filter information, and objects that exist outside are not visualized, thereby minimizing the provision of information to the user.

A Study on the Response to Acts of Unlawful Interference by Insider Threat in Aviation Security (항공보안 내부자 위협에 의한 불법방해행위의 대응을 위한 연구)

  • Sang-hoon Lim;Baek-yong Heo;Ho-won Hwang
    • Journal of Advanced Navigation Technology
    • /
    • v.27 no.1
    • /
    • pp.16-22
    • /
    • 2023
  • Terrorists have been attacking in the vulnerable points of aviation sector with the diverse methods of attacks. Recently, Vulnerability is increasing because the Modus Operandi of Terrorism is carried out by exploitation of people in the form of employee working in aviation sector whose role provides them with privileged access to secured locations, secured items or security sensitive information. Furthermore, cases of insider threat are rising across the world with the phenomenon of personal radicalization through internet and social network service. The government of ROK must respond to insider threat could exploit to acts of unlawful interference and the security regulations should be established to prevent from insider threat in advance refer to the acts of unlawful interference carried out in foreign countries and the recommendations by USA, UK and ICAO.

Threatening privacy by identifying appliances and the pattern of the usage from electric signal data (스마트 기기 환경에서 전력 신호 분석을 통한 프라이버시 침해 위협)

  • Cho, Jae yeon;Yoon, Ji Won
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.25 no.5
    • /
    • pp.1001-1009
    • /
    • 2015
  • In Smart Grid, smart meter sends our electric signal data to the main server of power supply in real-time. However, the more efficient the management of power loads become, the more likely the user's pattern of usage leaks. This paper points out the threat of privacy and the need of security measures in smart device environment by showing that it's possible to identify the appliances and the specific usage patterns of users from the smart meter's data. Learning algorithm PCA is used to reduce the dimension of the feature space and k-NN Classifier to infer appliances and states of them. Accuracy is validated with 10-fold Cross Validation.

The System of DHCPv6 for Secure Packet Transition in IPv6 Environment (IPv6 환경에서의 Secure Packet 전송을 위한 DHCPv6 시스템 개발)

  • Yoon, Yoon Sang;Chung, Jin Wook
    • Convergence Security Journal
    • /
    • v.3 no.3
    • /
    • pp.1-6
    • /
    • 2003
  • The IPv6 was suggested as an ultimate solution of problems that IPv4 protocol maintains limitations to apply to new technology of data service and the lack of IPv4 address space. So it is expected to transfer IPv4 to IPv6 gradually. In the Ipv6 environment, it is easier to apply security policies and transmits a secure packet applied the security policies, with the content in the Header itself. By this reason, this paper describes about the implementation of DHCPv6 server to perform a connection of IPv6 network and IPv4 network, and the application of secure packet with the security policies for clients. Further, it performs the process of the massages inside the DHCPv6 server to be used in the IPv6 environment in the future.

  • PDF