• Title/Summary/Keyword: cyber communication

Search Result 795, Processing Time 0.021 seconds

Smart card based three party key exchange protocol without server's aid (서버의 개입이 없는 스마트카드 기반의 3자간 키 교환 프로토콜)

  • Kim, Yong-Hun;Youn, Taek-Young;Park, Young-Ho
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.18 no.2
    • /
    • pp.11-20
    • /
    • 2008
  • Three-party key exchange protocol is a cryptographic protocol which permits two clients share a common session key using different passwords by the help of a trusted server. In a three-party key exchange protocol, an user remember only one password which shared with a trusted server for establish a common key with another user. The trusted server should participate in an execution of the protocol between two clients. This impose heavy burden on the server when many users want to establish a session key using the protocol. In this paper, we propose a three-party key exchange protocol based on a smart card which reduce the computational complexity and communication overhead for the trusted server. In our protocol, the server does not participate in an key exchange procedure between two clients.

An Attribute-Based Authentication Scheme Using Smart Cards (스마트카드를 이용한 속성기반 사용자 인증 스킴)

  • Yoo, Hye-Joung;Rhee, Hyun-Sook
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.18 no.5
    • /
    • pp.41-47
    • /
    • 2008
  • In a network environment, when a user requests a server's service, he/she must pass an examination of user authentication. Through this process, the server can determine if the user can use the provided services and the exact access rights of this user in these services. In these authentication schemes, the security of private information became an important issue. For this reason, many suggestions have been made in order to protect the privacy of users and smart cards have been widely used for authentication systems providing anonymity of users recently. An remote user authentication system using smart cards is a very practical solution to validate the eligibility of a user and provide secure communication. However, there are no studies in attribute-based authentication schemes using smart cards so far. In this paper, we propose a novel user authentication scheme using smart cards based on attributes. The major merits include : (1) the proposed scheme achieves the low-computation requirement for smart cards; (2) user only needs to register once and can use permitted various services according to attributes; (3) the proposed scheme guarantees perfect anonymity to remote server.

A Study on the Secure Plan of Security in SCADA Systems (SCADA 시스템의 안전성 확보방안에 관한 연구)

  • Kim, Young-Jin;Lee, Jung-Hyun;Lim, Jong-In
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.19 no.6
    • /
    • pp.145-152
    • /
    • 2009
  • SCADA(Supervisory Control And Data Acquisition) systems are widely used for control and monitoring of critical infrastructures including electricity, gas and transportation. Any compromise in the security of SCADA systems could result in massive chaos and disaster at a national level if a malicious attacker takes the control of the system. Therefore, sound countermeasures must be provided when the SCADA systems are being developed as well as when they are being operated. Unlike general information processing system, SCADA systems have different service responses, communication protocols and network architectures and therefore a different approach should be applied to each SCADA systems that takes into consideration of each system's security characteristics and architectures. In addition, legal basis should be established to ensure the nationwide management of the systems security. This paper examines the vulnerabilites of SCADA systems and proposes action plans to protect the systems against cyber attacks.

Detection The Behavior of Smartphone Users using Time-division Feature Fusion Convolutional Neural Network (시분할 특징 융합 합성곱 신경망을 이용한 스마트폰 사용자의 행동 검출)

  • Shin, Hyun-Jun;Kwak, Nae-Jung;Song, Teuk-Seob
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.24 no.9
    • /
    • pp.1224-1230
    • /
    • 2020
  • Since the spread of smart phones, interest in wearable devices has increased and diversified, and is closely related to the lives of users, and has been used as a method for providing personalized services. In this paper, we propose a method to detect the user's behavior by applying information from a 3-axis acceleration sensor and a 3-axis gyro sensor embedded in a smartphone to a convolutional neural network. Human behavior differs according to the size and range of motion, starting and ending time, including the duration of the signal data constituting the motion. Therefore, there is a performance problem for accuracy when applied to a convolutional neural network as it is. Therefore, we proposed a Time-Division Feature Fusion Convolutional Neural Network (TDFFCNN) that learns the characteristics of the sensor data segmented over time. The proposed method outperformed other classifiers such as SVM, IBk, convolutional neural network, and long-term memory circulatory neural network.

Performance Evaluation of the new AODV Routing Protocol with Cross-Layer Design Approach (교차 계층 설계 기법을 사용한 새로운 AODV 라우팅 프로토콜 설계 및 성능평가)

  • Jang, Jaeshin;Wie, Sunghong
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.24 no.6
    • /
    • pp.768-777
    • /
    • 2020
  • In this paper, we describe recent research results on AODV routing protocol, which is widely deployed at mobile ad hoc networks, and AODV related routing protocols with multi-path routing schemes. We suggest the critical problems which minimum hop routing schemes have, such as AODV routing protocol, and then, propose a new C-AODV routing protocol with two routing metrics: the primary metric is the hop count, the secondary metric is the sum of link delay times. We implemented C-AODV protocol by modifying AODV at the NS-3, and thus, elaborate on how we change the original AODV source code of NS-3 in order to implement the C-AODV scheme. We show numerical comparison of C-AODV scheme with the original AODV scheme and then, discuss how much the C-AODV enhances routing performance over AODV protocol. In conclusion, we present future research items.

3-Step Security Vulnerability Risk Scoring considering CVE Trends (CVE 동향을 반영한 3-Step 보안 취약점 위험도 스코어링)

  • Jihye, Lim;Jaewoo, Lee
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.27 no.1
    • /
    • pp.87-96
    • /
    • 2023
  • As the number of security vulnerabilities increases yearly, security threats continue to occur, and the vulnerability risk is also important. We devise a security threat score calculation reflecting trends to determine the risk of security vulnerabilities. The three stages considered key elements such as attack type, supplier, vulnerability trend, and current attack methods and techniques. First, it reflects the results of checking the relevance of the attack type, supplier, and CVE. Secondly, it considers the characteristics of the topic group and CVE identified through the LDA algorithm by the Jaccard similarity technique. Third, the latest version of the MITER ATT&CK framework attack method, technology trend, and relevance between CVE are considered. We used the data within overseas sites provide reliable security information to review the usability of the proposed final formula CTRS. The scoring formula makes it possible to fast patch and respond to related information by identifying vulnerabilities with high relevance and risk only with some particular phrase.

Education for 4th Industrial Revolution (4차산업혁명을 준비하는 교육)

  • Park, Jae-Hwan;Ahn, Jeeyoung
    • Asia-pacific Journal of Multimedia Services Convergent with Art, Humanities, and Sociology
    • /
    • v.8 no.5
    • /
    • pp.885-892
    • /
    • 2018
  • A series of revolutionary industrial changes took place from the 18th century of the First Industrial Revolution. The fourth industrial revolution is a new industrial revolution in which intelligence and information unite. Social, cultural, economic and educational systems are expected to emerge within the category of access and experience. In the course of intelligent mechanization, manpower and machinery need to be commandeered. Tools should be left to the machine and humans should look at essential issues. In the 4th Industrial Revolution, the paradigm of education should fundamentally change. Instead of routine technologies based on memorization, one should learn how to access and utilize. It needs to focus on areas of debate, cooperation, communication, sensibility, and artistry that robots and artificial intelligence can not afford. The fourth industrial revolution is the fusion of human beings and technology, the humanities and the technology.

A study on the Development of a Hybrid Library Model based on Information Commons (Information Commons기반 하이브리드(Hybrid)도서관 모형 개발에 관한 연구)

  • Chung, Jae-Young
    • Journal of the Korean BIBLIA Society for library and Information Science
    • /
    • v.20 no.2
    • /
    • pp.59-73
    • /
    • 2009
  • The library could get infinite possibilities of the space, if people had recognized that the library was not only the space for the reading and collecting of the books but also a special space for accomplishment of the investigation, learning, communication, and culture. Also, it can be desirable way for implementing the hybrid library. It means that combine with the traditional library which is the most important thing is a real space and the digital library, in contrast, the which is that the most important thing is the cyberspace. The purpose of this study is to develop a practical model for hybrid library based on the concept of information commons which is cooperation of the space, information technology and information services. This study intends to figure out the core elements involved in operative aspect of hybrid library through comparative analysis of domestic and foreign cases applied Information commons concepts to the library.

A study on the characteristics of brain image and yeongsang expression in the digital information environment (디지털 정보환경에 있어 뇌내 이미지와 영상표현의 특성에 관한 연구)

  • 이규옥
    • Archives of design research
    • /
    • v.16 no.2
    • /
    • pp.323-334
    • /
    • 2003
  • This study is focused on subjective images that are produced before visualization in the digital information environment and on characteristics of objective, dynamic image expression that specifies the subjective images. In this study, the visual world that works in the action of "see"is expanded into vision of eyes, vision of brain, and vision of camera. Also we have redefined the definitions of image and its materialized image, yeongsang. It is defined that image contains a strong meaning of consciousness and mind, and that yeongsang involves vision in which constantly changing information of light is created and reproduced by physical processes. We made it clear that image expression in the 21 st century is becoming more generalized, simplified, and concentrated, by the digital technology, from existing specific non-real images to "informationalized" non-real images. This means that there exists an intrinsic difference in the expressional form of the modern analog environment and that of the recent digital environment in the area of yeongsang communication. Along with development of technology, image information raises plastic reality through indirect experience in the virtual space by expanding the sensual faculty of human. However, there also is a tendency for humans to rely more on technology instead of utilizing their creative faculty. Image expression by“the digital information environment” in the 21st century will pursue two sides; one is to shift from external expression of the human body in the cyber space to internal expression, and the other is to internalize the image world and make it connected worldwide. Further research is necessary in these fields.ary in these fields.

  • PDF

A Study on the Influence of SNS Utilization on the Future Behavior Intention of Performance Arts Consumers by Preferred Performance Arts Genre (선호하는 공연예술 장르별로 SNS 활용이 공연예술소비자의 향후 행동의도에 미치는 영향에 관한 연구)

  • Koo, Eun-Ja;Ahn, Sung-Sik
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.17 no.6
    • /
    • pp.169-179
    • /
    • 2017
  • The objective of this study is to identify the influence of utilization of SNS among consumers who watch performance art on their behavioral intention in the future when there has been an increasing usage of SNS among consumers along with an increasing importance of SNS in the field of performance art and also the influence of SNS characteristics on behavioral intention of performance art consumers in the future according to their preferred genres. According to the results of empirical analysis in this study, usefulness, pleasure, and social influence, as SNS characteristics, turned out to positively influence on behavioral intention in the future. According to the result of analysis in difference of influence on behavioral intention in the future depending on preferred performance art genre, usefulness, pleasure, and availability in order among SNS characteristics turned out to influence on behavioral intention in the future in pop-music/entertainment concert. In addition, only usefulness turned out to influence on behavioral intention in the musical. Usefulness and availability in order turned out to influence on behavioral intention in the act. Lastly, only usefulness turned out to influence on behavioral intention in the music/ballet. According to aforementioned results of the study, it implies that SNS characteristics of performance art audiences are influencing on behavioral intention in the future. In addition, since there is a difference in behavioral intention in the future among art consumers in each genre, it is required to differentiate utilization and strategies of SNS in each genre.