• Title/Summary/Keyword: cyber communication

Search Result 795, Processing Time 0.023 seconds

A study on the implications for resolving medical authoritarianism through case analysis of medical service design (의료서비스디자인 사례분석을 통한 의료권위주의 해소를 위한 시사점 연구)

  • Chung, Sungmo
    • Journal of the Korea Convergence Society
    • /
    • v.11 no.9
    • /
    • pp.333-340
    • /
    • 2020
  • The purpose of this study is to find out what the contribution of medical service design to improve the quality of medical service has contributed to the resolution of medical authority, and to draw the implications necessary to further develop the medical service industry. As a method of research, first, the concept of medical authority was considered and the internal and external factors of medical authority were examined. Second, by examining the cases of medical service design, which resolved the medical emphasis inherent in internal and external factors, the key points and significance of problem solving were analyzed based on the core results. Third, the implications were to form a patient-centered medical culture for respect and dignity for patients, to break up the conventions inside medical staff to dismantle medical authority, and to establish a fair communication system for sharing medical information.

NEMO-enabled Hybrid Distributed Mobility Management (네트워크 이동성을 지원하는 하이브리드 분산 이동성 관리)

  • Wie, Sunghong
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.22 no.7
    • /
    • pp.1030-1040
    • /
    • 2018
  • In Distributed Mobility Management (DMM) protocol, the mobility functions are distributed to network edge closer to mobile users. DMM protocol has some advantages of low-cost traffic delivery, optimized routing path, high scalability. However, it needs many mobile anchors to exchange signaling messages and it results in a high signaling cost. Thus, previous works suggested the hybrid DMM protocol to reduce the high signaling cost for long-live sessions and this paper extends a hybrid scheme to the NEMO environment. The mobile routers are installed at vehicles and can move together with several mobile devices. So we can define the high-mobility property for mobile routers and suggest the hybrid scheme using this property. According to the high-mobility property of mobile routers, we can distribute the mobile anchors or allocate a centralized mobile anchor. In this paper, we mathematically analyze the performance of the proposed NEMO-enabled hybrid DMM protocol and show superior performance.

Designing an Efficient and Secure Credit Card-based Payment System with Web Services Based on the ANSI X9.59-2006

  • Cheong, Chi Po;Fong, Simon;Lei, Pouwan;Chatwin, Chris;Young, Rupert
    • Journal of Information Processing Systems
    • /
    • v.8 no.3
    • /
    • pp.495-520
    • /
    • 2012
  • A secure Electronic Payment System (EPS) is essential for the booming online shopping market. A successful EPS supports the transfer of electronic money and sensitive information with security, accuracy, and integrity between the seller and buyer over the Internet. SET, CyberCash, Paypal, and iKP are the most popular Credit Card-Based EPSs (CCBEPSs). Some CCBEPSs only use SSL to provide a secure communication channel. Hence, they only prevent "Man in the Middle" fraud but do not protect the sensitive cardholder information such as the credit card number from being passed onto the merchant, who may be unscrupulous. Other CCBEPSs use complex mechanisms such as cryptography, certificate authorities, etc. to fulfill the security schemes. However, factors such as ease of use for the cardholder and the implementation costs for each party are frequently overlooked. In this paper, we propose a Web service based new payment system, based on ANSI X9.59-2006 with extra features added on top of this standard. X9.59 is an Account Based Digital Signature (ABDS) and consumer-oriented payment system. It utilizes the existing financial network and financial messages to complete the payment process. However, there are a number of limitations in this standard. This research provides a solution to solve the limitations of X9.59 by adding a merchant authentication feature during the payment cycle without any addenda records to be added in the existing financial messages. We have conducted performance testing on the proposed system via a comparison with SET and X9.59 using simulation to analyze their levels of performance and security.

Method Research For Contents Express Ratio Of Display To Improve Learning Effect Of Smart Phone education media contents (스마트폰 교육미디어콘텐츠의 학습효과 향상용 콘텐츠 표출 비율 제고 방안에 관한 연구)

  • Lee, Jaewoo;Cha, Jaesang;Choi, Seongjhin;Lee, Seonhee
    • Journal of Satellite, Information and Communications
    • /
    • v.9 no.2
    • /
    • pp.91-95
    • /
    • 2014
  • We could use a social networking service such as data communication, personalized service through smart devices as Tablet computers and smart phones. Because of these characteristics, suitable lectures are provided to mobile device. especially, in Korea Cyber University already had built a lot of infrastructures. But, many mobile devices are used in a small display environment. it could effect on reduce Students' efficiency from taking courses. Therefore, we need effectively in a small display content layout for overcome these problems. In this paper, proposed the platform for Improve learning effect in smartphone education. It studied based on golden section and golden spiral theory. and also, we developed layout for content development using vector method illustration program.

Research on Protocol Conversion Gateway based on IEEE1815.1 (IEEE 1815.1 기반 이기종 프로토콜 변환 게이트웨이 기술 연구)

  • Lee, Seokjun;Kwon, Sungmoon;Shon, Taeshik;Park, Sungwan
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.26 no.5
    • /
    • pp.1201-1209
    • /
    • 2016
  • While the legacy electric grid evolving into the smart grid, various communication standards have been used for interoperability between many components. In this situation, the needs emerged for protocol conversion and mapping method for connecting the outside components to the operation center. In this paper, according to the surge of IEC 61850-based substation automation, we studied the protocol conversion gateway for linking legacy DNP3-based control center and IEC 61850-based substation automation. This paper is based on the IEEE 1815.1 standard for the protocol mapping. We suggested the direction of development the gateway and developed prototype for evaluate the proposed gateway. Also, we bring up a security problem and give a solution.

Method for Inferring Format Information of Data Field from CAN Trace (CAN 트레이스 분석을 통한 데이터 필드 형식 추론 방법 연구)

  • Ji, Cheongmin;Kim, Jimin;Hong, Manpyo
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.28 no.1
    • /
    • pp.167-177
    • /
    • 2018
  • As the number of attacks on vehicles has increased, studies on CAN-based security technologies are actively being carried out. However, since the upper layer protocol of CAN differs for each vehicle manufacturer and model, there is a great difficulty in researches such as developing anomaly detection for CAN or finding vulnerabilities of ECUs. In this paper, we propose a method to infer the detailed structure of the data field of CAN frame by analyzing CAN trace to mitigate this problem. In the existing Internet environment, many researches for reverse engineering proprietary protocols have already been carried out. However, CAN bus has a structure difficult to apply the existing protocol reverse engineering technology as it is. In this paper, we propose new field classification methods with low computation-cost based on the characteristics of data in CAN frame and existing field classification method. The proposed methods are verified through implementation that analyze CAN traces generated by simulations of CAN communication and actual vehicles. They show higher accuracy of field classification with lower computational cost compared to the existing method.

Prevention of Women's Crime Using Autonomous car & Drones of Smart Police Efficient Multicasting Environment (스마트치안에서의 자율주행차 및 드론을 활용한 여성 범죄 예방 연구)

  • Kim, Seung-woo;Jung, Yu-jin
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.22 no.10
    • /
    • pp.1294-1299
    • /
    • 2018
  • 'SMART Police' means collecting, analyzing and utilizing the police database such as crime statistics, reflecting 'strategic management', 'analysis and research', 'science technology' do. In recent years, the number of sex offenses has more than doubled based on the 'crime analysis' of the Supreme Prosecutors' In this trend, we started to build a sex crime prevention program for women 's relief special 3.0 which is suitable for regional characteristics. However, it was not enough for the women to have low publicity and utilization results, and to show the practical effect. In the future, we propose a crime prevention system which can safely take home safeguarding with autonomous driving car or drone by applying ICT to the future police system. Although it is difficult to operate autonomous vehicles and drones in the surrounding environment such as narrow alleys and power lines for application to this system, it is thought that the artificial intelligence technology can be sufficiently overcome to operate.

Implementation of user authentication and access control system using x.509 v3 certificate in Home network system (홈 네트워크 시스템에서 x.509 v3 인증서를 이용한 사용자 인증 및 접근제어 시스템의 구현)

  • Lee, Kwang-Hyoung;Lee, Young-Gu
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.11 no.3
    • /
    • pp.920-925
    • /
    • 2010
  • A home network system is made up of home devices and wire and wireless network can not only be the subject of cyber attack from a variety factors of threatening, but also have security weakness in cases of hacking, vicious code, worm virus, DoS attack, tapping of communication network, and more. As a result, a variety of problems such as abuse of private life, and exposure and stealing of personal information arose. Therefore, the necessity for a security protocol to protect user asset and personal information within a home network is gradually increasing. Thus, this dissertation designs and suggests a home network security protocol using user authentication and approach-control technology to prevent the threat by unauthorized users towards personal information and user asset in advance by providing the gradual authority to corresponding devices based on authorized information, after authorizing the users with a Public Key Certificate.

A Study for Performance Evaluation of Distributed Mobility Management based on Proxy Mobile IPv6 (PMIPv6기반의 분산 이동성 관리 방식의 성능 평가에 관한 연구)

  • Wie, Sunghong;Jang, Jaeshin
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.19 no.1
    • /
    • pp.97-105
    • /
    • 2015
  • Recently, due to an explosive growth of the internet traffic, the limitations of a current framework for a mobility management have been focused. The current centralized mobility management is prone to several problems and limitations: suboptimal routing, low scalability, signaling overhead, and a single point of failure. To overcome these problems and limitations, IETF is working about the distributed mobility management scheme that the centralized mobility functions of HA(Home Agents) are distributed to networks edges such as access routers. These distributions of mobility functions overcome the limitations of the centralized mobility managements and go with the trend of flat networks e.g. more simple network architecture. This paper analyzes the distributed mobility management based on Proxy Mobile IPv6 and demonstrates the performance superiority.

Hopping Routing Scheme to Resolve the Hot Spot Problem of Periodic Monitoring Services in Wireless Sensor Networks (주기적 모니터링 센서 네트워크에서 핫 스팟 문제 해결을 위한 호핑 라우팅 기법)

  • Heo, Seok-Yeol;Lee, Wan-Jik;Jang, Seong-Sik;Byun, Tae-Young;Lee, Won-Yeol
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.10 no.9
    • /
    • pp.2340-2349
    • /
    • 2009
  • In this paper we proposed a hopping routing scheme to resolve the hot spot problem for periodic monitoring services in wireless sensor networks. Our hopping routing scheme constructs load balanced routing path, where an amount of energy consumption of all nodes in the sensor networks is predictable. Load balanced routing paths can be obtained from horizontal hopping transmission scheme which balances the load of the sensor nodes in the same area, and also from vertical hopping transmission scheme which balances the load of the sensor nodes in the other area. The direct transmission count numbers as load balancing parameter for vertical hopping transmission are derived using the energy consumption model of the sensor nodes. The experimental results show that the proposed hopping scheme resolves the hot spot problem effectively. The efficiency of hopping routing scheme is also shown by comparison with other routing scheme such as multi-hop, direct transmission and clustering.