• 제목/요약/키워드: communication networks

Search Result 5,470, Processing Time 0.032 seconds

On the administrative security approaches against spear phishing attacks (스피어 피싱 대응을 위한 관리적 보안대책에 의한 접근)

  • Sohn, Yu-Seung;Nam, Kil-Hyun;Goh, Sung-Cheol
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.17 no.12
    • /
    • pp.2753-2762
    • /
    • 2013
  • Recently the paradigm of cyber attacks is changing due to the information security technology improvement. The cyber attack that uses the social engineering and targets the end users has been increasing as the organization's systems and networks security controls have been tightened. The 91% of APT(Advanced Persistent Threat) which targets an enterprise or a government agency to get the important data and disable the critical service starts with the spear phishing email. In this paper, we analysed the security threats and characteristics of the spear phishing in detail and explained why the technical solutions are not enough to prevent spear phishing attacks. Therefore, we proposed the administrative prevention methods for the spear phishing attack.

An Energy-Efficient MAC Protocol for Wireless Wearable Computer Systems

  • Beh, Jounghoon;Hur, Kyeong;Kim, Wooil;Joo, Yang-Ick
    • Journal of information and communication convergence engineering
    • /
    • v.11 no.1
    • /
    • pp.7-11
    • /
    • 2013
  • Wearable computer systems use the wireless universal serial bus (WUSB), which refers to USB technology that is merged with WiMedia physical layer and medium access control layer (PHY/MAC) technical specifications. WUSB can be applied to wireless personal area network (WPAN) applications as well as wired USB applications such as PAN. WUSB specifications have defined high-speed connections between a WUSB host and WUSB devices for compatibility with USB 2.0 specifications. In this paper, we focus on an integrated system with a WUSB over an IEEE 802.15.6 wireless body area network (WBAN) for wireless wearable computer systems. Due to the portable and wearable nature of wearable computer systems, the WUSB over IEEE 802.15.6 hierarchical medium access control (MAC) protocol has to support power saving operations and integrate WUSB transactions with WBAN traffic efficiently. In this paper, we propose a low-power hibernation technique (LHT) for WUSB over IEEE 802.15.6 hierarchical MAC to improve its energy efficiency. Simulation results show that the LHT also integrates WUSB transactions and WBAN traffic efficiently while it achieves high energy efficiency.

The Development of An Improved Distribution Automation System Including Low Voltage Monitoring Function (저압 배전망 감시기능을 포함하는 개선된 배전자동화시스템 개발)

  • Shin, Chang-Hoon
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.8 no.5
    • /
    • pp.1034-1041
    • /
    • 2007
  • This paper presents the developing results of improved distribution automation system including system configuration and subsystem design, prototype hardware and software implementation, and pilot tests on the real distribution networks of Korea Electric Power Corporation (KEPCO). An integrated system is designed to combine independent system for the distribution field works with DAS; transformer monitoring, power quality monitoring, voltage monitoring, outage monitoring, etc. The communication network is hierarchically configured as main network and branch network and well-defined integrated terminal units were developed. In addition, useful host configuration and applications were developed to integrate the services with DAS or interfacing other systems. Pilot tests were performed to verify that the system enables to properly integrate the DAS and other services of the distribution network.

  • PDF

Dynamic Resource Allocation Scheme for Interference Mitigation in Multi-Hop Relay Networks (멀티 홉 릴레이 네트워크에서 간섭을 완화하는 동적 자원 할당 기법)

  • An, Kwanghoon;Kim, Taejoon
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.5 no.5
    • /
    • pp.103-108
    • /
    • 2016
  • In this paper, we propose a resource allocation scheme that guarantees transmission rate for each mobile stations by mitigating interference between a base station-to-mobile station link and a relay station-to-mobile station link. Specifically, we dynamically adjust the boundary between access zone and relay zone using signal to interference plus noise ratio. Moreover, we cluster the mobile stations under sever interference and manage the channel quality of these mobile stations by allocating additional radio resource. Our simulation results show that the proposed scheme can improve the efficiency of radio resources and ensure fairness among mobile stations.

TFRC Congestion Control for Mobile Streaming Services Based on Guaranteed Minimum Transmission Rate (모바일 스트리밍 서비스를 위한 최소전송률 보장 기반 TFRC 혼잡제어)

  • Lee, Kang Seob;Choi, Seung-Sik
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.2 no.3
    • /
    • pp.117-124
    • /
    • 2013
  • In this paper we propose a TFRC(TCP Friendly Rate Control) which guarantees a minimum rate in order to improve the efficiency of the previous TFRC which cannot distinguish congestion losses and wireless losses and decreases throughput both in wired and wireless networks. This TFRC technique is able to guarantee a minimum rate for video by restricting a loss event rate with packet loss probability about existing TFRC and constraining a rate reduction from the feedback timeout. When we experimented both the existing TFRC and the new one with TCP in the same network, we found that the latter is better than the former. Consequently, it shows that the proposed TFRC can improve video streaming quality using a guaranteed minimum transmission rate.

Extending Caffe for Machine Learning of Large Neural Networks Distributed on GPUs (대규모 신경회로망 분산 GPU 기계 학습을 위한 Caffe 확장)

  • Oh, Jong-soo;Lee, Dongho
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.7 no.4
    • /
    • pp.99-102
    • /
    • 2018
  • Caffe is a neural net learning software which is widely used in academic researches. The GPU memory capacity is one of the most important aspects of designing neural net architectures. For example, many object detection systems require to use less than 12GB to fit a single GPU. In this paper, we extended Caffe to allow to use more than 12GB GPU memory. To verify the effectiveness of the extended software, we executed some training experiments to determine the learning efficiency of the object detection neural net software using a PC with three GPUs.

A Monitoring Method for Supporting QoS in Next Generation Mobile Communication Networks (차세대 이동통신망의 QoS를 보장하기 위한 모니터링 방법)

  • Lee, Gi-Sung;Lee, Jong-Chan
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.13 no.8
    • /
    • pp.3680-3686
    • /
    • 2012
  • This research suggests a monitoring method to support QoS of mobile multimedia services effectively based on information gathering. It means a method in which a subscriber's terminal collects information about its current condition and its surrounding base stations, and a base station, through the data collected by monitoring inner or adjacent base station, shares related data and converges, controlling QoS on its own. In other words, as context information of mobile terminal and base station changes, set-up of related functions and QoS mapping is adapted; each function fits into the change, exchanges the process of reorganization, and interacts; these actions go toward to satisfy service continuity.

Analyzing and Fixing the Vulnerabilities of ASK Protocol (ASK 모바일 프로토콜 취약점 분석 및 수정)

  • Ryu Gab Sang;Kim Il Gon;Kim Hyun Seok;Lee Ji Yeon;Kang In Hye;Choi Jin Young
    • Journal of KIISE:Information Networking
    • /
    • v.33 no.1
    • /
    • pp.1-8
    • /
    • 2006
  • Security protocols have usually been developed using informal design and verification techniques. However, many security protocols thought to be secure was found to be vulnerable later. Thus, the importance of formal specification and verification for analyzing the safely of protocols is increasing. With the rise of mobile communication networks, various mobile security protocols have been proposed. In this paper, we identify the security weakness of the ASK mobile Protocol using formal verification technique. In addition, we propose a new ASK protocol modifying its vulnerability and verify its robustness.

Implementation of Secure I-Mail System based on lava (타원곡선 알고리즘을 이용한 안전한 자바 메일 시스템의 설계 및 구현)

  • 이원구;조한진;이재광
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2001.10a
    • /
    • pp.700-702
    • /
    • 2001
  • As computers and networks become popular, distributing information on the Interment is common in our daily life. Also, the explosion of the Internet, of wireless digital communication and data exchange on Internet has rapidly changed the way we connect with other people. But secure mall is gamins popularity abroad and domestically because of their nature of prodding security. That is. it has been used a variety of fields such as general mail and e-mail for advertisement But, As the data transmitted on network can be easily opened or forged with simple operations. Most of existing e-mall system don't have any security on the transmitted information. Thus, security mail system need to provide security including message encryption, content integrity, message origin authentication, and non-repudiation. In this paper, we design implement secure mall system with non-repudiation service and encryption capability to provide services for certification of delivery and certification of content as well as the basic security services.

  • PDF

Secure Key Predistribution Scheme using Authentication in Cluster-based Routing Method (클러스터 기반에서의 인증을 통한 안전한 키 관리 기법)

  • Kim, Jin-Su;Choi, Seong-Yong;Jung, Kyung-Yong;Ryu, Joong-Kyung;Rim, Kee-Wook;Lee, Jung-Hyun
    • The Journal of the Korea Contents Association
    • /
    • v.9 no.9
    • /
    • pp.105-113
    • /
    • 2009
  • The previous key management methods are not appropriate for secure data communication in cluster-based routing scheme. Because cluster heads are elected in every round and communicate with the member nodes for authentication and share-key establishment phase in the cluster. In addition, there are not considered to mobility of nodes in previous key management mechanisms. In this paper, we propose the secure and effective key management mechanisim in the cluster-based routing scheme that if there are no share keys between cluster head and its nodes, we create the cluster key using authentication with base station or trust autentication and exchange the their information for a round.