• Title/Summary/Keyword: information security system

Search Result 6,591, Processing Time 0.043 seconds

Public Key-Based Operator Authentication Mechanism for Access Control of Multi-Control Systems in OT Control Network (OT제어망에서 다중 제어시스템 접근통제용 공개키 기반 운용자 인증 방안)

  • Kim, Dae-Hwi;Jo, In-June
    • The Journal of the Korea Contents Association
    • /
    • v.22 no.9
    • /
    • pp.64-75
    • /
    • 2022
  • The method of accessing multiple control systems in the OT control network centered on operation technology uses the operator authentication technology of each control system. An example is ID/PW operator authentication technology. In this case, since the OT control network is composed of multiple control systems, operator authentication technology must be applied to each control system. Therefore, the operator must bear the inconvenience of having to manage authentication information for each control system he manages. To solve these problems, SSO technology is used in business-oriented IT networks. However, if this is introduced into the OT control network as it is, the characteristics of the limited size of the OT control network and rapid operator authentication are not reflected, so it cannot be seen as a realistic alternative. In this paper, a public key-based authentication mechanism was newly proposed as an operator authentication technology to solve this problem. In other words, an integrated public key certificate that applies equally to all control systems in the OT control network was issued and used to access all control systems, thereby simplifying the authentication information management and making access to the control system more efficient and secure.

Location Information Hiding Way Of HD Black Box Recording process (HD 블랙박스 녹화과정에서의 위치정보 은익방법)

  • Seok, Jin-Hwan;Yoon, Jong-Chul;Hong, Jong-Sung;Han, Chan-Ho
    • Journal of the Institute of Convergence Signal Processing
    • /
    • v.17 no.1
    • /
    • pp.10-17
    • /
    • 2016
  • GPS location information storage included in the HD black box is using a unique manner for each manufacturer does not have a specific standard. In this paper, in order to overcome the limitations of the storage space and thereby the image quality according to store GPS position information deteriorate to solve the problems that cause, we propose the location information concealment method included in the HDTV video content using a essential hidden region. HDTV video content is a Border Extender of 8 lines in the frame to the bottom of the compression will be required. This was inserted into the image of a gray scale used in block form in order to space the current position information is concealed to prevent image degradation. The proposed method was confirmed using real HD black box, there are more difficult to interpret the format of the ASCII code re-edit the location information when the compression effect disappears with the existing security zones added. Therefore, the proposed method is suitable for location-based services, such as Facebook or Youtube videos.

NFC-based Smartwork Service Model Design (NFC 기반의 스마트워크 서비스 모델 설계)

  • Park, Arum;Kang, Min Su;Jun, Jungho;Lee, Kyoung Jun
    • Journal of Intelligence and Information Systems
    • /
    • v.19 no.2
    • /
    • pp.157-175
    • /
    • 2013
  • Since Korean government announced 'Smartwork promotion strategy' in 2010, Korean firms and government organizations have started to adopt smartwork. However, the smartwork has been implemented only in a few of large enterprises and government organizations rather than SMEs (small and medium enterprises). In USA, both Yahoo! and Best Buy have stopped their flexible work because of its reported low productivity and job loafing problems. In addition, according to the literature on smartwork, we could draw obstacles of smartwork adoption and categorize them into the three types: institutional, organizational, and technological. The first category of smartwork adoption obstacles, institutional, include the difficulties of smartwork performance evaluation metrics, the lack of readiness of organizational processes, limitation of smartwork types and models, lack of employee participation in smartwork adoption procedure, high cost of building smartwork system, and insufficiency of government support. The second category, organizational, includes limitation of the organization hierarchy, wrong perception of employees and employers, a difficulty in close collaboration, low productivity with remote coworkers, insufficient understanding on remote working, and lack of training about smartwork. The third category, technological, obstacles include security concern of mobile work, lack of specialized solution, and lack of adoption and operation know-how. To overcome the current problems of smartwork in reality and the reported obstacles in literature, we suggest a novel smartwork service model based on NFC(Near Field Communication). This paper suggests NFC-based Smartwork Service Model composed of NFC-based Smartworker networking service and NFC-based Smartwork space management service. NFC-based smartworker networking service is comprised of NFC-based communication/SNS service and NFC-based recruiting/job seeking service. NFC-based communication/SNS Service Model supplements the key shortcomings that existing smartwork service model has. By connecting to existing legacy system of a company through NFC tags and systems, the low productivity and the difficulty of collaboration and attendance management can be overcome since managers can get work processing information, work time information and work space information of employees and employees can do real-time communication with coworkers and get location information of coworkers. Shortly, this service model has features such as affordable system cost, provision of location-based information, and possibility of knowledge accumulation. NFC-based recruiting/job-seeking service provides new value by linking NFC tag service and sharing economy sites. This service model has features such as easiness of service attachment and removal, efficient space-based work provision, easy search of location-based recruiting/job-seeking information, and system flexibility. This service model combines advantages of sharing economy sites with the advantages of NFC. By cooperation with sharing economy sites, the model can provide recruiters with human resource who finds not only long-term works but also short-term works. Additionally, SMEs (Small Medium-sized Enterprises) can easily find job seeker by attaching NFC tags to any spaces at which human resource with qualification may be located. In short, this service model helps efficient human resource distribution by providing location of job hunters and job applicants. NFC-based smartwork space management service can promote smartwork by linking NFC tags attached to the work space and existing smartwork system. This service has features such as low cost, provision of indoor and outdoor location information, and customized service. In particular, this model can help small company adopt smartwork system because it is light-weight system and cost-effective compared to existing smartwork system. This paper proposes the scenarios of the service models, the roles and incentives of the participants, and the comparative analysis. The superiority of NFC-based smartwork service model is shown by comparing and analyzing the new service models and the existing service models. The service model can expand scope of enterprises and organizations that adopt smartwork and expand the scope of employees that take advantages of smartwork.

Malicious Trojan Horse Application Discrimination Mechanism using Realtime Event Similarity on Android Mobile Devices (안드로이드 모바일 단말에서의 실시간 이벤트 유사도 기반 트로이 목마 형태의 악성 앱 판별 메커니즘)

  • Ham, You Joung;Lee, Hyung-Woo
    • Journal of Internet Computing and Services
    • /
    • v.15 no.3
    • /
    • pp.31-43
    • /
    • 2014
  • Large number of Android mobile application has been developed and deployed through the Android open market by increasing android-based smart work device users recently. But, it has been discovered security vulnerabilities on malicious applications that are developed and deployed through the open market or 3rd party market. There are issues to leak user's personal and financial information in mobile devices to external server without the user's knowledge in most of malicious application inserted Trojan Horse forms of malicious code. Therefore, in order to minimize the damage caused by malignant constantly increasing malicious application, it is required a proactive detection mechanism development. In this paper, we analyzed the existing techniques' Pros and Cons to detect a malicious application and proposed discrimination and detection result using malicious application discrimination mechanism based on Jaccard similarity after collecting events occur in real-time execution on android-mobile devices.

A Design of Advanced Channel Creation in e-Passport (전자여권의 향상된 채널생성 기법 설계)

  • Lee, Gi-Sung;Jeon, Sang-Yeob;Jun, Moon-Seog
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.13 no.10
    • /
    • pp.4814-4821
    • /
    • 2012
  • An e-passport is equipped with bio information by adding the non-attachable IC chip with a smart function. In order to solve such a problem, the user's privacy is protected by using the BAC, PA, AA and EAC mechanisms. However, the password key used in the BAC mechanism is made of the combination of the MRZ values. As a result, it is possible to decode the password by using the indiscriminate attacking program after finding out the combined rules of MRZ. This thesis suggests the mechanism with an improved level of efficiency through the time-stamp values by using the information of images and fingerprints and checking the forge or falsification of the e-passport when establishing a safe channel between the chip of the e-passport and the decoding system.

u-Healthcare Service Authentication Protocol based on RFID Technology (RFID 기술을 이용한 u-헬스케어 서비스 인증 프로토콜)

  • Jeong, Yoon-Su;Lee, Sang-Ho
    • Journal of Digital Convergence
    • /
    • v.10 no.2
    • /
    • pp.153-159
    • /
    • 2012
  • Now a days, U-healthcare comes into the spotlight as a new business model which combines RFID technology with medical service in the well-being era and IT popularization. U-healthcare service needs a method that can deals with hand-writing, overlap data, forgery and falsification of data, difference between information version that happen in medical process because of graft between RFID technology and u-healthcare. This paper proposes RFID based user certification protocol to protect user's privacy who gets medical service through U-healthcare. In the protocol, secret information of patient does the XOR with the secret key that is created in the hospital to reconsider the stability of security system of U-healthcare and user's data forgery and falsification and privacy and then saves it in the secret key field of patient in DB table. Also, it informs the case of illegal access to certification server and make it approved the access of u-healthcare service by differentiating whether u-healthcare is illegal or not.

Research on a Solution for Efficient ECG Data Transmission in u-Healthcare Environment (u-Healthcare 환경에서의 효율적인 ECG 데이터 전송 방안에 관한 연구)

  • Cho, Gyoun-Yon;Lee, Seo-Joon;Lee, Tae-Ro
    • Journal of Digital Convergence
    • /
    • v.12 no.1
    • /
    • pp.397-403
    • /
    • 2014
  • In u-Healthcare environment, large amounts of important medical information is processed through wireless communication. Therefore there is a need to increase the efficiency of the network system of sending ECG data. This paper presents a compression solution for efficient ECG data transmission(ECGLZW) in u-Healthcare environment. The results showed that the average compression ratio of ECGLZW was 4.6, which got 200% better than existing methods(Huffman and LZW compression). ECGLZW's high compression ratio can increase the efficiency of wireless channels. As a result, reliable communication and security of u-Healthcare information could be achieved by applying these remaining channels to retransmission and encryption.

The data transparency of RPS using blockchain method

  • Kang, Dae-Ho;Cho, Kyu-Cheol
    • Journal of the Korea Society of Computer and Information
    • /
    • v.25 no.3
    • /
    • pp.81-88
    • /
    • 2020
  • The Renewable Portfolio Standard(RPS) which is in operated by country for many years is eco-friendly energy business. Although a variety of institute are accessing the RPS, it consists of a centralized system. Also, it shows opacity of data access in user's point of view. And each institutes is possessing their own data collected by themselves. Therefore decentralization and integrated control is demanded. Also, when institutes are attacked, the interruption of RPS can be existed. For resolving this issue, this study proposes the RPS using blockchain. Using the consortium method of blockchain, every institutes has possessing same data inserting REC data in block data, it is resolvable that transparency and security issue as transaction through verification of certain block. Furthermore, in case of one institute is paused by external attack, the role can be replaced by other institutes. This study tried the processing of putting data through ethereum network, therefore it presents the possibility of introducing the blockchain method in RPS.

Exploring Spatial Patterns of Theft Crimes Using Geographically Weighted Regression

  • Yoo, Youngwoo;Baek, Taekyung;Kim, Jinsoo;Park, Soyoung
    • Journal of the Korean Society of Surveying, Geodesy, Photogrammetry and Cartography
    • /
    • v.35 no.1
    • /
    • pp.31-39
    • /
    • 2017
  • The goal of this study was to efficiently analyze the relationships of the number of thefts with related factors, considering the spatial patterns of theft crimes. Theft crime data for a 5-year period (2009-2013) were collected from Haeundae Police Station. A logarithmic transformation was performed to ensure an effective statistical analysis and the number of theft crimes was used as the dependent variable. Related factors were selected through a literature review and divided into social, environmental, and defensive factors. Seven factors, were selected as independent variables: the numbers of foreigners, aged persons, single households, companies, entertainment venues, community security centers, and CCTV (Closed-Circuit Television) systems. OLS (Ordinary Least Squares) and GWR (Geographically Weighted Regression) were used to analyze the relationship between the dependent variable and independent variables. In the GWR results, each independent variable had regression coefficients that differed by location over the study area. The GWR model calculated local values for, and could explain the relationships between, variables more efficiently than the OLS model. Additionally, the adjusted R square value of the GWR model was 10% higher than that of the OLS model, and the GWR model produced a AICc (Corrected Akaike Information Criterion) value that was lower by 230, as well as lower Moran's I values. From these results, it was concluded that the GWR model was more robust in explaining the relationship between the number of thefts and the factors related to theft crime.

Research on John School as a policy to prevent recidivism of online sex trafficking

  • Park, Jong-Ryeol;Noe, Sang-Ouk
    • Journal of the Korea Society of Computer and Information
    • /
    • v.23 no.8
    • /
    • pp.143-149
    • /
    • 2018
  • Recently, President Donald Trump signed FOSTA (Fight Online Sex Trafficking Act) in April 11, 2018, which makes online service no more immune from civil liability for the action of third party facilitating sex trafficking content. Although it is also important to enhance security regulations and cognition on law, but it will be economically more effective to put more energy on preventing recidivism. For John School in Korea, it should increase implementation rate by putting core manpower and budget for preventing needs of sex purchase and then, check operation method and efficacy to improve the actual program. One way is first, empirical analysis and data is required on efficacy of John School program. Second, should have clear definition in Special Sex Trade Law. Third, more strick regulation for selecting participant is required. Fourth, more manpower and budget is required. Fifth, charging the participant for educational fee shall be reviewed. Sixth, educational program should be reviewed. The most important point of education is to make those criminals feel guilty about financially purchasing the sex, basically making them to recognize that it is ethically wrong. However, the current education system contains no clear explanation about the ethical issue of such problem but focusing more on other factors such as sexual disease and structural problem of sexual business. Therefore, this failed to deliver the right psychological training to those criminals without any ethical control. Knowing why women feel hurt when having unwanted sexual relationship by being paid is required part in terms of education for preventing sex trafficking.