• Title/Summary/Keyword: Wired

Search Result 1,194, Processing Time 0.032 seconds

Intelligent & Predictive Security Deployment in IOT Environments

  • Abdul ghani, ansari;Irfana, Memon;Fayyaz, Ahmed;Majid Hussain, Memon;Kelash, Kanwar;fareed, Jokhio
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.12
    • /
    • pp.185-196
    • /
    • 2022
  • The Internet of Things (IoT) has become more and more widespread in recent years, thus attackers are placing greater emphasis on IoT environments. The IoT connects a large number of smart devices via wired and wireless networks that incorporate sensors or actuators in order to produce and share meaningful information. Attackers employed IoT devices as bots to assault the target server; however, because of their resource limitations, these devices are easily infected with IoT malware. The Distributed Denial of Service (DDoS) is one of the many security problems that might arise in an IoT context. DDOS attempt involves flooding a target server with irrelevant requests in an effort to disrupt it fully or partially. This worst practice blocks the legitimate user requests from being processed. We explored an intelligent intrusion detection system (IIDS) using a particular sort of machine learning, such as Artificial Neural Networks, (ANN) in order to handle and mitigate this type of cyber-attacks. In this research paper Feed-Forward Neural Network (FNN) is tested for detecting the DDOS attacks using a modified version of the KDD Cup 99 dataset. The aim of this paper is to determine the performance of the most effective and efficient Back-propagation algorithms among several algorithms and check the potential capability of ANN- based network model as a classifier to counteract the cyber-attacks in IoT environments. We have found that except Gradient Descent with Momentum Algorithm, the success rate obtained by the other three optimized and effective Back- Propagation algorithms is above 99.00%. The experimental findings showed that the accuracy rate of the proposed method using ANN is satisfactory.

A study with respect to the home networking security Technology based on SIP (SIP기반 홈네트워킹 보안 기술에 관한 연구)

  • Ham, Yoeng-Ock;Shin, Young-Tae
    • Journal of the Korea Society of Computer and Information
    • /
    • v.14 no.12
    • /
    • pp.169-180
    • /
    • 2009
  • Generally home networks are based on wired network and wireless network. This makes customers be capable of using electric home appliances and full-duplex multimedia services and controlling the machines without any restrictions of place or time. Now that the scope of home security is being extended, the home networks can be formed with not only personal computer but also home automation, electric home appliances, and etc. But this causes many of attacks of invasion and damages. Therefore in this paper we suggest the SSIP(Secure Session Initiate protocol) model for solving those problems. The SSIP model is able to provide an efficient authentication and reduce the time of session re-establishment and set-up by adding ability of SIP authentication to Cluster-to-Cluster environment performed on home gateway.

A Study of Vehicle Diagnostic Data Processing using Diagnostic Communications (진단 통신을 활용한 차량 진단데이터 처리 연구)

  • Chang, Moon-soo
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2021.05a
    • /
    • pp.267-270
    • /
    • 2021
  • In order to diagnose a vehicle, it is achieved by collecting diagnostic data within the ECU or between ECUs and managing the diagnostic data by utilizing various communication methods through an electronic device composed of an ECU(Electronic Control Unit), which is an automotive electronic device. As communication methods, LIN, CAN, FlexRay are mainly used. Recently, wired/wireless communication is being used based on Ethernet. In order to perform vehicle diagnosis, it is necessary to know the diagnosis code generated by the ECU and to collect diagnosis data using diagnosis communication. In addition, diagnostic data can be managed from the ECU only when the application software required for vehicle diagnosis is configured. If many automobile manufacturers are manufacturing ECUs based on the AUTOSAR standard, which is an automotive electronic standard, the software structure is also configured to be applied according to the standard. In this paper, we understand the vehicle diagnosis communication method of the AUTUSAR standard, study the configuration and processing method of diagnosis data, and study the contents of software components, diagnosis communication, and diagnosis event processing.

  • PDF

Development of Offshore Construction ROV System applying Pneumatic Gripper (공압 gripper를 적용한 해양 건설 ROV 시스템 개발)

  • Park, Jihyun;Hwang, Yoseop
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.26 no.11
    • /
    • pp.1697-1705
    • /
    • 2022
  • The safety of marine construction workers and marine pollution problems are occurring due to large-scale offshore construction. In particular, underwater construction work in the sea has a higher risk than other work, so it is necessary to apply an unmanned alternative system that considers the safety of the workers. In this paper, the ROV system for offshore construction has been developed for underwater unmanned work. A monitoring system was developed for position control through the control of underwater propellants, pneumatic gripper, and monitoring of underwater work. As a result of the performance evaluation, the underwater movement speed of the ROV was evaluated to be 0.89 m/s, and it was confirmed that the maximum load of the pneumatic gripper was 80 kg. In addition, the network bandwidth required for underwater ROV control and underwater video streaming was evaluated to be more than 300Mbps, wired communication at 92.7 ~ 95.0Mbit/s at 205m, and wireless communication at 78.3 ~ 84.8Mbit/s.

A Study on the Causes of Security Vulnerability in 'Wall Pads' ('월패드'의 보안 취약 원인에 관한 고찰)

  • Kim Sang Choon;Jeon Jeong Hoon
    • Convergence Security Journal
    • /
    • v.22 no.2
    • /
    • pp.59-66
    • /
    • 2022
  • Recently, smart home technology has been developed with a great response due to the convenience of home automation. Smart home technology provides various services by connecting various Internet of Things (IoT) and sensors to a home network through wired/wireless networks. In addition, the smart home service easily and conveniently controls lighting, energy, environment, and door cameras through a wall pad. However, while it has become a social issue due to the recent hacking accident of wall pads, personal information leakage and privacy infringement are expected. Accordingly, it is necessary to prepare preventive and countermeasures against security vulnerability factors of wall pads. Therefore, this study expects that it can be used as basic data for future smart home application and response technology development by examining the weak causes and countermeasures related to wall pads.

A Study on The Characteristics of U-slot Microstrip Antenna (U-slot형 마이크로스트립 안테나 특성 연구)

  • Yong-Wook Park
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.19 no.1
    • /
    • pp.25-30
    • /
    • 2024
  • The modern society has become full-fledged entry into the information age since spread of Internet. In the information age, internet was developed from the wired access to the wireless Internet access. When a surge in demand for wireless Internet access, efficiency and performance of 2.4GHz band which leads to saturation of the communication was significantly fall. Accordingly, the communication of the 5GHz band came to be interested. In this paper, we studied the design and fabrication of u-slot microstrip patch antenna to be used in wireless communication systems operating at around 5GHz band. To obtain antenna parameters such as patch size, inter patch space, antenna was simulated by HFSS(High Frequency Structure Simulator). From these parameters, u-slot microstrip antenna is fabricated using FR-4 substrate of dielectric constant 4.4. The characteristics of fabricated antenna were analyzed by network analyzer.

Enhancing Installation Security for Naval Combat Management System through Encryption and Validation Research

  • Byeong-Wan Lee
    • Journal of the Korea Society of Computer and Information
    • /
    • v.29 no.1
    • /
    • pp.121-130
    • /
    • 2024
  • In this paper, we propose an installation approach for Naval Combat Management System(CMS) software that identifies potential data anomalies during installation. With the popularization of wireless communication methods, such as Low Earth Orbit(LEO) satellite communications, various utilization methods using wireless networks are being discussed in CMS. One of these methods includes the use of wireless network communications for installation, which is expected to enhance the real-time performance of the CMS. However, wireless networks are relatively more vulnerable to security threats compared to wired networks, necessitating additional security measures. This paper presents a method where files are transmitted to multiple nodes using encryption, and after the installation of the files, a validity check is performed to determine if there has been any tampering or alteration during transmission, ensuring proper installation. The feasibility of applying the proposed method to Naval Combat Systems is demonstrated by evaluating transmission performance, security, and stability, and based on these evaluations, results sufficient for application to CMS have been derived.

A OTT content data analysis technique on a PC environment (PC 환경에서의 OTT 콘텐츠 데이터 분석 방법)

  • Chanwoo Lee;Junyoung Heo
    • Smart Media Journal
    • /
    • v.13 no.2
    • /
    • pp.62-67
    • /
    • 2024
  • Due to technological advancements in viewing devices and the COVID-19 pandemic, a lot of OTT-only content is being produced and distributed as people shift from traditional movie theater viewing and broadcasters' fixed TV viewing to free-form OTT viewing using wired and wireless internet. As a result, the ability to leverage data from OTT audiences has become critical to the competitiveness of the industry. However, third parties other than OTT content providers are facing difficulties in acquiring OTT viewer data. In this paper, as a way to overcome the shortcomings of existing viewer data acquisition, we propose a method to extract audio and video data by developing an OTT viewing data acquisition agent using Web APIs by adopting a web browser environment that does not affect the performance of OS and viewing devices, so that third-party companies that need viewing data can utilize it.

A Study on Establishing Scientific Guard Systems based on TVWS (TVWS 기반 과학화경계시스템 구축방안 연구)

  • Kyuyong Shin;Yuseok Kim;Seungwon Baik
    • Convergence Security Journal
    • /
    • v.23 no.4
    • /
    • pp.81-92
    • /
    • 2023
  • In recent years, the ROK military is promoting Defense Innovation 4.0 with the goal of fostering strong military based on science and technology equipped with artificial intelligence(AI) to prepare for the upcoming population cliff. In particular, at the present time of increased threats of North Korea, the South Korean military is seeking to deal with a decrease in military service resources through the introduction of a Scientific Guard System using advanced technology. TICN which is a core basic communication system to ensure the integrated combat capability of the ROK military is, however, limited to use as a based network for the emerging Scientific Guard System due to the narrow transmission bandwidth with widely spread poor reception area. To deal with this problem, this paper proposes TVWS-based Scientific Guard Systems with TVWS-based wireless network construction technology that has been available for free in Korea since 2017. The TVWS-based Scientific Guard System proposed in this paper, when compared to the existing wired network-based Scientific Guard Systems, has various advantages in terms of minimizing operational gaps, reducing construction costs, and flexibility in installation and operation.

Do Innovation and Relative Advantage Affect the Actual Use of FinTech Services?: An Empirical Study using Classical Attitude Theory (핀테크 서비스의 혁신성과 상대적 장점은 실질이용에 영향을 미칠까?: 고전적 태도이론을 이용한 실증 연구)

  • Se Hun Lim
    • Information Systems Review
    • /
    • v.21 no.3
    • /
    • pp.87-110
    • /
    • 2019
  • The Fintech services provide innovation to financial services users using various mobile devices and computers in wired and wireless communication environments. In this study, we develope a theoretical research framework to explain the psychology of Fintech services users based on a cognitive, affective, and conative framework. Using this framework, this study analyzes the relationships between the cognitive characteristics (i.e., innovation, relative advantage, ease of use, and usefulness), emotional characteristic (i.e., attitude), and behavioral characteristic (i.e., actual use) toward Fintech services users. This study conducted an online survey of people who have experienced using Fintech services. And the data of the collected Fintech services users was analyzed using structural equation model software (i.e., SMART PLS 2.0 M3). The results of the empirical analysis show the relationships between innovation, relative advantage, perceived usefulness, perceived ease of use, attitude, and actual use of Fintech service users. The results of this study provide useful information to improve the practical use of Fintech services users in the Internet of Things (IoT) environment.