• Title/Summary/Keyword: information security system

Search Result 6,591, Processing Time 0.033 seconds

Realization of temperature compensation algorithm on portable radiation detection device based on Cortex-A9 (Cortex-A9 기반 휴대용 방사선 검출장치에서의 온도보상 알고리즘 구현)

  • Nam, Hye-Jin;Lee, Jon-Hwey;Kim, Young-Kil
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.17 no.11
    • /
    • pp.2729-2735
    • /
    • 2013
  • Safety and security system have been internationally enhanced in a field of shipping logistics. Accordingly, techniques for safety and security have been studied steadily. The need of portable radiation detection device is increasing by the search of the container is enhanced. In this paper, we propose to study on the application of the temperature compensation algorithm to the platform to improve the accuracy and the realization of portable radiation detection device based on Cortex-A9. Analog board deforms signal output from the sensor. And Cortex-A9 platform analyzes the signal received and displays the results. Additionally we use the temperature compensation algorithm and thereby we ca look the same results even if the temperature changes.

A Design of DA_UDC(Double Authentication User.Device.Cross) Module using OTA(One Time Authentication) Key in Home Network Environment (홈 네트워크 환경에서 OTA(One Time Authentication)키를 이용한 DA_UDC(Double Authentication User.Device.Cross) 모듈 설계)

  • Jeong, Eun-Hee;Lee, Byung-Kwan
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.34 no.4B
    • /
    • pp.419-427
    • /
    • 2009
  • This paper propose DA-UDC(Double Authentication User, Device, Cross) Module which solves the cost problem and the appropriation of Certificate using User Authentication, Device Authentication and Cross Authentication with OTA(One Time Authentication) Key, and which is designed not to subscribe to the service of Home network business. Home Server transmits its public key which is needed to create OTA to the user which passed the first step of authentication which verifies User ID, Device ID and Session Key. And it performs the second step of authentication process which verifies the OTA key created by a user. Whenever the OTA key of DA-UDC module is generated, the key is designed to be changed. Therefore, DA-UDC Module prevents the exposure of User and Device ID by performing the two steps of authentication and enhances the authentication security of Home Network from malicious user with OTA key. Also, DA-UDC Module is faster than the existing authentication system in processing speed because it performs authentication calculation only once. Though DA-UDC Module increases data traffic slightly because of the extra authentication key, it enhances the security more than the existing technique.

Secure Healthcare Data Management and Sharing Platform Based on Hyperledger Fabric (하이퍼레저 패브릭 기반의 안전한 헬스케어 데이터 관리 및 공유 플랫폼 개발 연구)

  • Choi, Ye-Jin;Kim, Kyoung-jin
    • Journal of Internet Computing and Services
    • /
    • v.21 no.1
    • /
    • pp.95-102
    • /
    • 2020
  • In this paper, we present a healthcare data integration management and sharing platform based on a permissioned blockchain-based system called the Hyperledger fabric. The Hyperledger fabric allows patients to easily access their data, share the data with agencies that need it, and also reward participants. The healthcare data is stored in the blockchain by a de-identification process. Privacy is protected by setting detailed access rights to the stored data. The proposed model provides higher security than other models using a public blockchain. This study confirms that patient data can be stored more securely, by comparing the data stored in the blockchain with that from existing information storage methods.

Implementation of A9-Based Digital Portable Radiation Detector with the Algorithm of Temperature Compensation in Scintillator (Scintillator에 온도 보정 알고리즘을 적용한 A9기반의 디지털 휴대용 방사선 검출기 구현)

  • Lim, Ik-Chan;Park, Geo;Kim, Young-kil
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.21 no.10
    • /
    • pp.1981-1989
    • /
    • 2017
  • In accordance with the global strengthening of security systems for the safety of the shipping and logistics industry, the development of core technologies within the field has become a key in the establishment of Korea's own national logistics security system. Further in line with these global developments, there is growing attention within Korea to the development of portable radiation detectors capable of detecting gamma ray nuclides. In addition, many parts are becoming localized. In this research, instead of Pulse Shaping Board, which is used in existing portable radiation detectors, we have implemented an Algorithm to discriminate nuclides and correct the temperature conversion efficiency of the scintillator. This paper aims to improve the performance of these devices through the implementation of a temperature conversional algorithm within the scintillator of the A9-based digital portable radiation detector.

Implementation of RBAC Certification & DB Security Based on PMI for NEIS (NEIS를 위한 PMI 기반의 RBAC 인증과 DB 보안 구현)

  • Ryoo Du-Gyu;Moon Bong-Keun;Jun Moon-Seog
    • The KIPS Transactions:PartC
    • /
    • v.11C no.7 s.96
    • /
    • pp.981-992
    • /
    • 2004
  • The established NEIS has a lot of problems in the management of security. It does not realize access control in following authority because it only uses PKI certification in user certification and the use of central concentration DBMS and plain text are increased hacking possibility in NEIS. So, This paper suggests a new NEIS for the secure management of data and authority certification. First, we suggest the approached authority in AC pf PMI and user certification in following the role, RBAC. Second, we realize DB encryption plan by digital signature for the purpose of preventig DB hacking. Third, we suggest SQL counterfeit prevention by one-way hash function and safe data transmission per-formed DB encryption by digital signature.

A Secure and Effective Optimal Path Searching Method on Certificate Chains in Mobile Ad hoc NETworks (모바일 애드흑 네트워크의 안전하고 효과적인 치적의 인증경로 탐색 기법)

  • Choi, Sung-Jae;Kim, Yong-Woo;Lee, Hong-Ki;Song, Joo-Seok;Nyang, Dae-Mon
    • Journal of KIISE:Information Networking
    • /
    • v.32 no.3
    • /
    • pp.310-317
    • /
    • 2005
  • In opposition to conventional networks, mobile ad hoc networks usually do not offer trust about nodes or online access through certificate authorities or centralized servers. But, nodes in those systems need process that can search path as well as trust each other to exchange data in safety For these reasons, traditional security measures that require online trusted authorities or certificate storages are not well-suited for securing ad hoc networks. In this paper, I propose a secure and effective method to search the optimized path using profitable flooding techniques on certificate chains in MANETS(Mobile Ad hoc NETworks). This system includes not only using routing protocols that are generally broadcasting packets but also finding nodes securely and verifing the process through tiust relationships between nodes that are searched.

Modem Leadership Wisdoms from Tasan's Ideology-Centered Upon the Connection between Leadership of Generals and MokMinShimSuh (다산 사상에서 찾는 현대 리더십의 지혜-고급제대 리더십과 목민심서의 연계를 중심으로)

  • Kim, Jong-Du
    • Journal of National Security and Military Science
    • /
    • s.4
    • /
    • pp.45-82
    • /
    • 2006
  • This paper seeks to search for wisdoms that may be applied to modern leadership through Tasan Jeong Yakyong's ideology, ShilHak, from the Chosun Dynasty. The present period is referred as the period of transformation and innovation or the period of knowledge information The leadership appropriate for the current period is thus called revolutionary leadership. This leadership accomplishes its goals by influencing the constituent's values, ethics, behavioral norms, and visions based on the leader's moral values, knowledge, and information. Thus, the essence of this paper is in acquiring wisdoms of leadership by company revolutionary leadership with Tasan's life. Tasan pursued change and innovation in a time where Chosun was in a state of decay by following the flow of world powers towards the concept of studying truth based upon facts such as changing the system of thought, reforming legislation, and developing technology. Moreover, he gave courage and hope to the people by demonstrating such leadership in practice. In addition, despite false accusations and spending 18 years in exile, he showed revolutionary life as an active intellectual by leaving 542 volumes of writing through his 'value innovation' that he "pursue things only for the people and the state." Consequently, the paper first deals with what kind of leadership is required for a leader in the position of a general and examines the kind of leadership capacity demanded. Subsequently, Tasan 's revolutionary life and hints of leadership messages in MokMinSimSuh are examined. Thus, this paper is centered upon the leadership of generals regarding how MokMinShimSuh may be applicable to modern leadership.

  • PDF

Design and Implementation of Packet Filtering Mechanism for Secure Teredo Service (안전한 Teredo 서비스를 위한 패킷 필터링 메커니즘 설계 및 구현)

  • Heo, Seok-Yeol;Shin, Bum-Joo;Han, Ki-Jun;Lee, Wan-Jik
    • Journal of Korea Society of Industrial Information Systems
    • /
    • v.12 no.3
    • /
    • pp.47-59
    • /
    • 2007
  • IPv4 NAT, which often used in households or under SOHO environments, is one of the factors that delays IPv6 propagation. As IPv4 NAT does not operate properly under the transition mechanism like ISATAP or 6to4 that acts as IPv6-in-IPv4 tunneling type, Microsoft proposed Teredo in order to resolve this issue. However, tunneling transition mechanism like Teredo has a security problem. That is, being tunneled packets have dual IP headers; general firewall systems apply the filtering rules only to the outer header but not inner header when these packets pass the firewall. Furthermore, attacks using unregistered server and relay can take place in Teredo. To resolve these problems, we propose a new packet filtering mechanism exclusively for Teredo. The proposed packet filtering mechanism was designed and implemented by using Linux Netfilter and ip6tables. Through functional and experimental performance tests, this packet filtering system was found operating properly and solving the Teredo packet filtering problems without serious performance degradation.

  • PDF

TCAM Partitioning for High-Performance Packet Classification (고성능 패킷 분류를 위한 TCAM 분할)

  • Kim Kyu-Ho;Kang Seok-Min;Song Il-Seop;Kwon Teack-Geun
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.31 no.2B
    • /
    • pp.91-97
    • /
    • 2006
  • As increasing the network bandwidth, the threat of a network also increases with emerging various new services. For a high-performance network security, It is generally used that high-speed packet classification methods which employ hardware like TCAM. There needs an method using these devices efficiently because they are expensive and their capacity is not sufficient. In this paper, we propose an efficient packet classification using a Ternary-CAM(TCAM) which is widely used device for high-speed packet classification in which we have applied Snort rule set for the well-known intrusion detection system. In order to save the size of an expensive TCAM, we have eliminated duplicated IP addresses and port numbers in the rule according to the partitioning of a table in the TCAM, and we have represented negation and range rules with reduced TCAM size. We also keep advantages of low TCAM capacity consumption and reduce the number of TCAM lookups by decreasing the TCAM partitioning using combining port numbers. According to simulation results on our TCAM partitioning, the size of a TCAM can be reduced by upto 98$\%$ and the performance does not degrade significantly for high-speed packet classification with a large amount of rules.

A Blockchain-Based Content Authentication Scheme for CCN (블록체인 기반 CCN 콘텐츠 인증 기술)

  • Kim, DaeYoub
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.28 no.4
    • /
    • pp.975-985
    • /
    • 2018
  • ICN architecture, one of future Internet technologies, proposes that content request packets toward a content source can be responded by several distributed nodes. So, ICN can solve network congestion which is happened around content sources and provide a seamless content distribution service regardless of the network and system statuses of content sources. Especially, CCN implements content caching functionality in network nodes so that such intermediated network nodes can themselves respond to content requests. However, when receiving content from distributed nodes, users receiving content cannot authenticate the nodes providing the content. So CCN is vulnerable to various attacks such as an impersonation attack, a data pollution attack, and so on. This paper first describes CCN content authentication and its weakness. Then it proposes an improved content authentication scheme based on a blockchain and evaluates the performance of the proposed scheme.