• Title/Summary/Keyword: Wireless service

Search Result 2,740, Processing Time 0.031 seconds

Efforts against Cybersecurity Attack of Space Systems

  • Jin-Keun Hong
    • Journal of Positioning, Navigation, and Timing
    • /
    • v.12 no.4
    • /
    • pp.437-445
    • /
    • 2023
  • A space system refers to a network of sensors, ground systems, and space-craft operating in space. The security of space systems relies on information systems and networks that support the design, launch, and operation of space missions. Characteristics of space operations, including command and control (C2) between space-craft (including satellites) and ground communication, also depend on wireless frequency and communication channels. Attackers can potentially engage in malicious activities such as destruction, disruption, and degradation of systems, networks, communication channels, and space operations. These malicious cyber activities include sensor spoofing, system damage, denial of service attacks, jamming of unauthorized commands, and injection of malicious code. Such activities ultimately lead to a decrease in the lifespan and functionality of space systems, and may result in damage to space-craft and, lead to loss of control. The Cybersecurity Adversarial Tactics, Techniques, and Common Knowledge (ATT&CK) matrix, proposed by Massachusetts Institute of Technology Research and Engineering (MITRE), consists of the following stages: Reconnaissance, Resource Development, Initial Access, Execution, Persistence, Privilege Escalation, Defense Evasion, Credential Access, Discovery, Lateral Movement, Collection, Command & Control, Exfiltration, and Impact. This paper identifies cybersecurity activities in space systems and satellite navigation systems through the National Institute of Standards and Technology (NIST)'s standard documents, former U.S. President Trump's executive orders, and presents risk management activities. This paper also explores cybersecurity's tactics attack techniques within the context of space systems (space-craft) by referencing the Sparta ATT&CK Matrix. In this paper, security threats in space systems analyzed, focusing on the cybersecurity attack tactics, techniques, and countermeasures of space-craft presented by Space Attack Research and Tactic Analysis (SPARTA). Through this study, cybersecurity attack tactics, techniques, and countermeasures existing in space-craft are identified, and an understanding of the direction of application in the design and implementation of safe small satellites is provided.

Wearable Device Security Threat Analysis and Response Plan (웨어러블 디바이스 보안 위협 및 대응 방안)

  • Sung-Hwa Han
    • Convergence Security Journal
    • /
    • v.24 no.2
    • /
    • pp.55-61
    • /
    • 2024
  • With the development of IoT technology, wearable services have also developed rapidly. Wearable devices required for this service are used as sensors and controllers in the form of smart bands. Wearable devices implement very concise SWlogic for possible long-term use and use wireless communication protocols to improve convenience. However, because this wearable device aims to be lightweight, it is more vulnerable to security than terminals used for other information services. Many smart healthcare or smart medical services are passive or do not apply security technology. By exploiting this security environment, attackers can obtain or modify important information through access to wearable devices. In this study, we analyzed the technical operating environment of wearable services and identified authentication information reuse attacks, BIAS attacks, battery drain attacks and firmware attacks on wearable devices. And we analyzed the mechanism of each security threat and confirmed the attack effect. In this study, we presented a response plan to respond to the identified security threats. When developing wearable services, it is expected that safer services can be built if the response plan proposed in this study is considered.

Do Innovation and Relative Advantage Affect the Actual Use of FinTech Services?: An Empirical Study using Classical Attitude Theory (핀테크 서비스의 혁신성과 상대적 장점은 실질이용에 영향을 미칠까?: 고전적 태도이론을 이용한 실증 연구)

  • Se Hun Lim
    • Information Systems Review
    • /
    • v.21 no.3
    • /
    • pp.87-110
    • /
    • 2019
  • The Fintech services provide innovation to financial services users using various mobile devices and computers in wired and wireless communication environments. In this study, we develope a theoretical research framework to explain the psychology of Fintech services users based on a cognitive, affective, and conative framework. Using this framework, this study analyzes the relationships between the cognitive characteristics (i.e., innovation, relative advantage, ease of use, and usefulness), emotional characteristic (i.e., attitude), and behavioral characteristic (i.e., actual use) toward Fintech services users. This study conducted an online survey of people who have experienced using Fintech services. And the data of the collected Fintech services users was analyzed using structural equation model software (i.e., SMART PLS 2.0 M3). The results of the empirical analysis show the relationships between innovation, relative advantage, perceived usefulness, perceived ease of use, attitude, and actual use of Fintech service users. The results of this study provide useful information to improve the practical use of Fintech services users in the Internet of Things (IoT) environment.

Performance Analysis of Multi-Code CDMA System over IS-95B Forward Channel (IS-95B 순방향 채널에서의 멀티코드 CDMA 시스템의 성능분석)

  • 곽재민;최창호;이영교;오창헌;김언곤;조성준
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.25 no.5B
    • /
    • pp.879-888
    • /
    • 2000
  • In this paper, the performance of IS-95B CDMA system adopting multi-code scheme for data service on the forward link is obtained by theoretical analysis and computer simulation. The wireless channel is assumed to include AWGN, MUI(Multi-User Interference), and MPI(Multi-Path Interference), and multipath Rayleigh fading modeled by TDL(Tapped Delay Line). To obtain actual performance, IS-95B system using PN codes(M-sequence) concatenated with Walsh codes is considered. The BER performance of voice/data service satisfying QoS requirement and the maximum capacity of voice users is derived in terms of various system parameters(voice activity factor, required SNR of voice/data users, the number of multi-codes, the number of voice/data users.,etc.). As a result, under the condition that the maximum allowable number of voice user is 38 in voice only system, as the number of multi-code is decreased by 1, the maximum allowable number of voice user is increased by 5% for system with 1 data user and 22.3% for system with 4 data users. Therefore, it is possible to increase maximum allowable number of users in IS-95B CDMA system by appropriate control of the number of multi-codes and required SNR according to channel environment and traffic characteristic.

  • PDF

New Retransmission Method using the minimum MPDU starting Spacing in Two-level Aggregation of IEEE 802.11n (IEEE 802.11n의 2-레벨 집적 방식에서 최소 MPDU 시작 간격을 이용하는 새로운 재전송 방법)

  • Shin, In Cheol;Kim, Dong-Hoi
    • Journal of Broadcast Engineering
    • /
    • v.20 no.2
    • /
    • pp.300-309
    • /
    • 2015
  • In IEEE 802.11n WLANs(Wireless Local Area Networks), to support high throughput, MAC(Media Access Control) layer adopts A-MSDU(Aggregate-MAC Service Data Unit) and A-MPDU(Aggregate-MAC Protocol Data Unit). Generally, as the A-MPDU uses a selective retransmission capability, A-MPDU provides higher throughput than A-MSDU. However, although A-MPDU uses the selective re-transmission capability, if the size of MPDU within A-MPDU is smaller than the size of minimum MPDU starting spacing, A-MPDU can reduce throughput because of the overhead of retransmission owing to the addition of delimiter, that is a dummy MPDU. Therefore, to overcome the above problem, two-level Aggregation method, where the small MPDU within A-MPDU is replaced by not delimiter but A-MSDU, has been introduced. In the two-level Aggregation method, the existing re-transmission scheme retransmits only A-MPDU, but if the size of retransmission data is smaller than the size of the minimum MPDU starting spacing, the proposed retransmission scheme retransmits the aggregated retransmission data and MSDUs. Therefore, we know that the proposed retransmission scheme have better throughput that the existing retransmission scheme.

Design and Implementation of Query Processor for Moving Objects (이동객체를 위한 질의처리 컴포넌트의 설계 및 구현)

  • Kim, Kyoung-Sook;Kwon, O-Je;Byun, Hee-Young;Jo, Dae-Soo;Kim, Tae-Wan;Li, Ki-Joune
    • Journal of Korea Spatial Information System Society
    • /
    • v.6 no.1 s.11
    • /
    • pp.31-50
    • /
    • 2004
  • With the growth of wireless communication networks and mobile devices taking in GPS, Location-Based Service(LBS) is becoming an integral part of mobile applications. LBS can deal with location-aware features such as persons holding mobile phones or vehicles equipped with GPS, and provide the users with the location information of the features. Thus it is necessary to develop moving object database systems to store, manage, and query moving objects which change their locations continuously as time passes. In this paper, we design and implement a query processing component which deals with moving objects as a key data type. For this component, we define a new SQL-like query language(called MOQL) and as a consequence, design and implement modules that analyze and execute queries. It supports various types of operators that process range queries, infer topological relations, compute trajectories, and find k-nearest neighbors. It can be used as a subsystem if other application systems which deal moving objects and also supports ADO.NET interface that can be used to interact end-users.

  • PDF

An Analysis on the Evolutionary Characteristics of Ubiquitous City through Evolutionary Map of Ubiquitous City (유시티 진화 지도를 통한 유시티 진화 특성 분석)

  • JO, Sung-Soo;LEE, Sang-Ho;LEEM, Youn-Taik
    • Journal of the Korean Association of Geographic Information Studies
    • /
    • v.18 no.2
    • /
    • pp.75-91
    • /
    • 2015
  • This study aims to analyse the U-City characteristics through the U-City historical mapping. The U-City characteristics were analysed by building the U-City historical map in terms of STIM model which consists of service, technology, infrastructure and management. The data for analysis is the National Informatization White Paper published by the NIA (National Information Society Agency) from 2002 to 2013. As a result, first, the U-City service were evolved from administration informatization, enterprise informatization, administration/living informatization and administration/space/private informatization through the intelligence facilities and space. Second, the U-City technology were changed through wire network, sensor/network, processing/super-highway network, convergence of network/security. Third, the U-City infrastructure have had evolutionary process such as wire computer network, wire/wireless network, intellectualization facility and intelligent facility space. Forth, the U-City management were carried out with making the unit network/infrastructure management, information connection/operating management and information integration/participation management. Therefore, the history of U-City has been making rapid development in government computerization, computer oriented society, information city and ubiquitous city.

An Efficient Spatial Index Technique based on Flash-Memory (플래시 메모리 기반의 효율적인 공간 인덱스 기법)

  • Kim, Joung-Joon;Sim, Hee-Joung;Kang, Hong-Koo;Lee, Ki-Young;Han, Ki-Joon
    • Journal of Korea Spatial Information System Society
    • /
    • v.11 no.2
    • /
    • pp.133-142
    • /
    • 2009
  • Recently, with the advance of wireless internet and the frequent use of mobile devices, demand for LBS(Location Based Service) is increasing, and research is required on spatial indexes for the storage and maintenance of spatial data to provide efficient LBS in mobile device environments. In addition, the use of flash memory as an auxiliary storage device is increasing in order to store large spatial data in a mobile terminal with small storage space. However, the application of existing spatial indexes to flash-memory lowers index performance due to the frequent updates of nodes. To solve this problem, research is being conducted on flash-memory based spatial indexes, but the efficiency of such spatial indexes is lowered by low utilization of buffer and flash-memory space. Accordingly, in order to solve problems in existing flash-memory based spatial indexes, this paper proposed FR-Tree (Flash-Memory based R-Tree) that uses the node compression technique and the delayed write operation technique. The node compression technique of FR-Tree increased the utilization of flash-memory space by compressing MBR(Minimum Bounding Rectangle) of spatial data using relative coordinates and MBR size. And, the delayed write operation technique reduced the number of write operations in flash memory by storing spatial data in the buffer temporarily and reflecting them in flash memory at once instead of reflecting the insert, update and delete of spatial data in flash-memory for each operation. Especially, the utilization of buffer space was enhanced by preventing the redundant storage of the same spatial data in the buffer. Finally, we perform ed various performance evaluations and proved the superiority of FR-Tree to the existing spatial indexes.

  • PDF

Beacon Signal Strength Analysis for Efficient Indoor Positioning (효율적인 실내 위치 측위를 위한 비콘 신호세기 분석)

  • Hwang, Hyun-seo;Park, Jin-tae;Yun, Jun-soo;Phyo, Gyung-soo;Moon, Il-young;Lee, Jong-sung
    • Journal of Advanced Navigation Technology
    • /
    • v.19 no.6
    • /
    • pp.552-557
    • /
    • 2015
  • Recent performed by recognizing a user's location, various services have been tailored focus on short-range wireless communication technology. A beacon in which is attracting attention as next-generation technology. Beacon is a terminal by utilizing the frequency of the non-audible area can not be bluetooth and human sending and receiving terminals and information, Apple recently iBeacon like a low-power Bluetooth (BLE; bluetooth low energy) based beacon showing a tendency to rise into the mainstream there. Services using a beacon is basically installs the terminal in a certain place indoor. It is characterized by providing the user the services to catch the user's position, even automatically take a separate action. Various types of location-based service provided by the target interior space began to attract attention. A variety of location-based services are provided in the interior space in order to be successfully deployed and provide guidance to the interior space, the movement route and the like are essentially required to build various types of information. In this paper, for efficient indoor positioning by varying the signal strength of the beacon in such areas were measured and analyzed.

A Routing Scheme Considering Bottleneck and Route Link Quality in RPL-based IoT Wireless Networks (RPL 기반 IoT 무선 네트워크에서 노드 병목 및 전송 경로 품질을 고려한 라우팅 기법)

  • Jung, Ik-Joo;Chung, Sang-Hwa;Lee, Sung-Jun
    • Journal of KIISE
    • /
    • v.42 no.10
    • /
    • pp.1268-1279
    • /
    • 2015
  • In order to manage a large number of devices connected to the Internet of Things (IoT), the Internet Engineering Task Force (IETF) proposed the IPv6 Routing Protocol for Low Power and Lossy Networks (RPL). The route of the RPL network is generated through the use of an Objective Function (OF) that is suitable for the service that is required for the IoT network. Since the route of the RPL network is conventionally simply chosen only by considering the link quality between the nodes, it is sensible to seek an OF that can also provide better Quality of Service (QoS). In previous studies, the end-to-end delay might possibly be sub-optimal because they only deal with problems related to the reduction of energy consumption and not to the link quality on the path to the sink node. In this study, we propose a scheme that reduces the end-to-end delay but also gives full consideration to both the quality on the entire route to the destination and to the expected lifetime of nodes with bottlenecks from heaped traffic. Weighting factors for the proposed scheme are chosen by experiments and the proposed scheme can reduce the end-to-end delay and the energy consumption of previous studies by 20.8% and 10.5%, respectively.