• Title/Summary/Keyword: information weakness

Search Result 789, Processing Time 0.025 seconds

Design of Device Authentication Protocol Based on C-PBFT in a Smart Home Environment (스마트 홈 환경에서 C-PBFT 기반의 디바이스 인증 프로토콜 설계)

  • Kim, Jeong-Ho;Heo, Jae-Wook;Jun, Moon-Seog
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.20 no.5
    • /
    • pp.550-558
    • /
    • 2019
  • As the scale of the Internet of Things (IoT) environment grows and develops day by day, the information collected and shared through IoT devices becomes increasingly diverse and more common. However, because IoT devices have limitations on computing power and a low power capacity due to their miniaturized size, it is difficult to apply security technologies like encryption and authentication that have been directly applied in the previous Internet environment, making the IoT vulnerable to security threats. Because of this weakness, important information that needs to be delivered safely and accurately is exposed to the threat of malicious exploitation, such as data forgery, data leakage, and infringement of personal information. In order to overcome this threat, various security studies are being actively conducted to compensate for the weaknesses in IoT environment devices. In particular, since various devices interact, and share and communicate information collected in the IoT environment, each device should be able to communicate with reliability. With regard to this, various studies have been carried out on techniques for device authentication. This study examines the limitations and problems of the authentication techniques that have been studied thus far, and proposes technologies that can certify IoT devices for safe communication between reliable devices in the Internet environment.

A Study on the Improvement of Source Code Static Analysis Using Machine Learning (기계학습을 이용한 소스코드 정적 분석 개선에 관한 연구)

  • Park, Yang-Hwan;Choi, Jin-Young
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.30 no.6
    • /
    • pp.1131-1139
    • /
    • 2020
  • The static analysis of the source code is to find the remaining security weaknesses for a wide range of source codes. The static analysis tool is used to check the result, and the static analysis expert performs spying and false detection analysis on the result. In this process, the amount of analysis is large and the rate of false positives is high, so a lot of time and effort is required, and a method of efficient analysis is required. In addition, it is rare for experts to analyze only the source code of the line where the defect occurred when performing positive/false detection analysis. Depending on the type of defect, the surrounding source code is analyzed together and the final analysis result is delivered. In order to solve the difficulty of experts discriminating positive and false positives using these static analysis tools, this paper proposes a method of determining whether or not the security weakness found by the static analysis tools is a spy detection through artificial intelligence rather than an expert. In addition, the optimal size was confirmed through an experiment to see how the size of the training data (source code around the defects) used for such machine learning affects the performance. This result is expected to help the static analysis expert's job of classifying positive and false positives after static analysis.

Reversible data hiding technique applying triple encryption method (삼중 암호화 기법을 적용한 가역 데이터 은닉기법)

  • Jung, Soo-Mok
    • The Journal of Korea Institute of Information, Electronics, and Communication Technology
    • /
    • v.15 no.1
    • /
    • pp.36-44
    • /
    • 2022
  • Reversible data hiding techniques have been developed to hide confidential data in the image by shifting the histogram of the image. These techniques have a weakness in which the security of hidden confidential data is weak. In this paper, to solve this drawback, we propose a technique of triple encrypting confidential data using pixel value information and hiding it in the cover image. When confidential data is triple encrypted using the proposed technique and hidden in the cover image to generate a stego-image, since encryption based on pixel information is performed three times, the security of confidential data hidden by triple encryption is greatly improved. In the experiment to measure the performance of the proposed technique, even if the triple-encrypted confidential data was extracted from the stego-image, the original confidential data could not be extracted without the encryption keys. And since the image quality of the stego-image is 48.39dB or higher, it was not possible to recognize whether confidential data was hidden in the stego-image, and more than 30,487 bits of confidential data were hidden in the stego-image. The proposed technique can extract the original confidential data from the triple-encrypted confidential data hidden in the stego-image without loss, and can restore the original cover image from the stego-image without distortion. Therefore, the proposed technique can be effectively used in applications such as military, medical, digital library, where security is important and it is necessary to completely restore the original cover image.

Operative Challenges in Releasing Administrative Information and Records (행정정보 및 보존기록물 공개의 운영과제)

  • Lee, Won-Kyu
    • The Korean Journal of Archival Studies
    • /
    • no.12
    • /
    • pp.81-135
    • /
    • 2005
  • The release of administrative information has been the challenge of our age following the maturation of democratic ideology in our society. However, differences of opinion and conflict still exist between the government and private sectors regarding the issue, and it seems that the technical and policy-related insufficiencies of information and record management that actually operate the release of information are the main causes. From the perspective of records management, records or information are variable in their nature, value, and influence during their life span. The most controversial issue is the records and information in the current stage of carrying out business activities. This is because the records and information pertaining to finished business are but evidence to ascertain the past, and have only a limited relationship to the ideal of the 'democratic participation' by citizens in activities of the public sector. The current information release policies are helpless against the 'absence of information,' or incomplete records, but such weakness can be supplemented by enforcing record management policies that make obligatory the recording of all details of business activities. In addition, it is understood that the installation of 'document offices("Jaryogwan")' that can manage each organization's information and records will be an important starting point to integrate the release, management, and preservation of information and records. Nevertheless, it seems that the concept of 'release' in information release policies refers not to free use by all citizens but is limited to the 'provision' of records according to public requests, and the concept of 'confidential' refers not to treating documents with total secrecy but varies according to the particulars of each situation, making the actual practice of information release difficult. To solve such problems, it is absolutely necessary to collect the opinions of various constituents associated with the recorded information in question, and to effectively mediate the collective opinions and the information release requests coming from applicants, to carry out the business more practically. Especially crucial is the management of the process by which the nature and influence of recorded information changes, so that information which has to be confidential at first may become available for inquiry and use over time through appropriate procedures. Such processes are also part of the duties that record management, which is in charge of the entire life span of documents, must perform. All created records will be captured within a record management system, and the record creation data thus collected will be used as a guide for inquiry and usage. With 'document offices(Jaryogwan)' and 'archives' controlling the entire life span of records, the release of information will become simpler and more widespread. It is undesirable to try to control only through information release policies those records the nature of which has changed because, unlike the ones still in the early stages of their life span and can directly influence business activities, their work has finished, and they have become historical records or evidences pointing to the truth of past events. Even in the past, when there existed no formal policy regarding the release of administrative information, the access and use of archival records were permitted. A more active and expanded approach must be taken regarding the 'usage' of archival records. If the key factor regarding 'release' lies in the provision of information, the key factor regarding 'usage' lies in the quality and level of the service provided. The full-scale usage of archival records must be preceded by the release of such records, and accordingly, a thorough analysis of the nature, content, and value of the records and their changes must be implemented to guarantee the release of information before their use is requested. That must become a central task of document offices and "Today's information" will soon become "yesterday's records," and the "reality" of today will become "history" of the past. The policies of information release and record management share information records as their common objective. As they have a mutual relationship that is supplementary and leads toward perfection, the two policies must both be differentiated and integrated with each another. It is hoped that the policies and business activities of record management will soon become normalized and reformed for effective and fair release of information.

Parameter Estimation for Multipath Error in GPS Dual Frequency Carrier Phase Measurements Using Unscented Kalman Filters

  • Lee, Eun-Sung;Chun, Se-Bum;Lee, Young-Jae;Kang, Tea-Sam;Jee, Gyu-In;Kim, Jeong-Rae
    • International Journal of Control, Automation, and Systems
    • /
    • v.5 no.4
    • /
    • pp.388-396
    • /
    • 2007
  • This paper describes a multipath estimation method for Global Positioning System (GPS) dual frequency carrier phase measurements. Multipath is a major error source in high precision GPS applications, i.e., carrier phase measurements for precise positioning and attitude determinations. In order to estimate and remove multipath at carrier phase measurements, an array GPS antenna system has been used. The known geometry between the antennas is used to estimate multipath parameters. Dual frequency carrier phase measurements increase the redundancy of measurements, so it can reduce the number of antennas. The unscented Kalman filter (UKF) is recently applied to many areas to overcome some of the limitations of the extended Kalman filter (EKF) such as weakness to severe nonlinearity. This paper uses the UKF for estimating multipath parameters. A series of simulations were performed with GPS antenna arrays located on a straight line with one reflector. The geometry information of the antenna array reduces the number of estimated multipath parameters from four to three. Both the EKF and the UKF are used as estimation algorithms and the results of the EKF and the UKF are compared. When the initial parameters are far from true parameters, the UKF shows better performance than the EKF.

The Study on the Energy and Fluid Metabolism and the Pathology and Symptomatology of Taeeumin based on The Discourse on Viscera and Bowels of Donguisusebowon (『동의수세보원(東醫壽世保元)』 「장부론(臟腑論)」에 근거한 기액대사(氣液代謝)와 태음인(太陰人) 병리병증(病理病證) 고찰(考察))

  • Lee, Jun-Hee;Lee, Eui-Ju;Koh, Byung-Hee
    • Journal of Sasang Constitutional Medicine
    • /
    • v.24 no.4
    • /
    • pp.1-16
    • /
    • 2012
  • Objectives : We aimed to analyze the meanings of the energy and fluid metabolism in the Discourse on Viscera and Bowels of Donguisusebowon, and to find the clues for the explanation of the pathology and symptomatology of Taeeumin. Methods : The Discourse on Viscera and Bowels of Donguisusebowon was reviewed and examined for relevant information on the energy and fluid metabolism from the structural and the functional point of view respectively. And, based on the derived meanings of the energy and fluid metabolism, the pathology and symptomatology of Taeeumin were analyzed. Results and Conclusions : 1. The meanings of the energy and fluid metabolism can be explained by the different attributes of the energy and fluid produced from the esophagus and the small intestine, and the different function of exhaling-dispersing and inhaling-concentrating in the different tract of circulation such as Lung affiliation (esophagus, skin, ear and lung) and Liver affiliation (small intestine, flesh, nose and liver). 2. The Exterior disease of Taeeumin starts with the weakness of exhaling-dispersing function at the skin, and leads to the dysfunction of the esophagus and the lung sequently. The dysfunction of the lung aggravates that of the skin and the esophagus. 3. The Interior disease of Taeeumin begins with excess of the inhaling-concentrating functions at the flesh and the small intestine, and leads to the dysfunction of the lung, which induces the dysfunction of exhaling-concentration at the skin and esophagus. And, this disparities between exhaling-dispersing and inhaling-concentrating functions exasperate the problem at the flesh and the small intestine.

Public Key based LR-WPAN Security Algorithm (공개키 방식의 LR-WPAN 보안 알고리즘)

  • Kim, Jin-Cheol;Oh, Young-Hwan
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.43 no.11 s.353
    • /
    • pp.54-67
    • /
    • 2006
  • Low Rate WPAN (Wireless Personal Area Network) designed for low power and low cost wireless communication is an important technology to realize ubiquitous environment. IEEE 802.15.4 and ZigBee Alliance recommend the SKKE (Symmetric-Key Key Establishment) protocol for key establishment and management. The SKKE algorithm has security weakness such as the absence of authentication process or electric signature in key generation and exchange when devices join the role of coordinators. In this paper, we propose new key establishment and security algorithm based on public key encryption to solve low rate WPAN security problems. Also, to improve PLC AMR system's weaknesses in communication reliability and security, we propose a new AMR system model based on IEEE 802.15.4 and we apply our security algorithm to AMR profile for security enhancement.

A Study on Visible Light Communication with Turbo Coded OFDM for Intelligent Transport Systems (지능형 교통 시스템을 위한 Turbo Code OFDM 적용한 가시광 통신 시스템에 관한 연구)

  • Koo, Sung-Wan;Kim, Jin-Young
    • The Journal of The Korea Institute of Intelligent Transport Systems
    • /
    • v.9 no.2
    • /
    • pp.60-67
    • /
    • 2010
  • In the ubiquitous age, applications of wireless personal area network (WPAN) technology using LEDs are in progress. However, visible light communications (VLC) using the LEDs have weakness which deteriorate performance of communication because of multi-path fading that occurs propagation delay by interior walls or other things in indoor environments. In this paper, orthogonal frequency division multiplexing (OFDM) scheme is adapted to decrease multi-path fading and multi-path dispersion and to provide high speed data transmission. Besides, to reduce information losses caused by optical noise (incandescent lamps, fluorescent lamps, sunbeam etc.) also proposed channel coding using turbo codes. The encoding and decoding of the proposed system is described, and simulation results are analyzed. We can know that performance of proposed system is increased about 4 [dB] through the simulation results. Also, when the system take doppler effect, the system performance worsened.

Characteristics of Fall Events and Fall Risk Factors among Inpatients in General Hospitals in Korea (입원 환자의 낙상실태 및 위험요인 조사연구: 국내 500병상 이상 종합병원을 중심으로)

  • Choi, Eun Hee;Ko, Mi Suk;Yoo, Cheong Suk;Kim, Mi Kyoung
    • Journal of Korean Clinical Nursing Research
    • /
    • v.23 no.3
    • /
    • pp.350-360
    • /
    • 2017
  • Purpose: The purpose of this study was to investigate the present status of falls among inpatients in general hospitals and to identify the fall risk factors that reflect the characteristics of domestic hospitals. Methods: Data were collected between December 15, 2016 and January 15, 2017 from 32 Korean hospitals having 500 or more beds. First, 42 risk factors were extracted based on literature review and expert opinions. Then the importance of each factor was evaluated by 223 nurses from medical and surgical adult ward and intensive care units in 40 hospitals. Results: The incidence rate of falls in 18 hospitals was 3.87 per 1,000 total discharged patients and 0.55 per 1,000 patient-days, and the rate of injury-related falls was 40.5%. Major risk factors for falling were identified as the following: being over 65 years of age, history of falls during admission, physical mobility disorders requiring assistance, physical factors (dizziness or vertigo, unstable gait, general weakness, walking aids, visual problems), cognitive factors (delirium, lack of understanding on limitations), neurological disease, CNS medications Conclusion: The findings provide information that can be in the development of a fall risk assessment tool for inpatients in general hospitals in Korea.

A Study on Security Authentication Vector Generation of Virtualized Internal Environment using Machine Learning Algorithm (머신러닝 알고리즘이 적용된 가상화 내부 환경의 보안 인증벡터 생성에 대한 연구)

  • Choi, Do-Hyeon;Park, Jung Oh
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.16 no.6
    • /
    • pp.33-42
    • /
    • 2016
  • Recently, the investment and study competition regarding machine running is accelerating mainly with Google, Amazon, Microsoft and other leading companies in the field of artificial intelligence. The security weakness of virtualization technology security structure have been a serious issue continuously. Also, in most cases, the internal data security depend on the virtualization security technology of platform provider. This is because the existing software, hardware security technology is hard to access to the field of virtualization and the efficiency of data analysis and processing in security function is relatively low. This thesis have applied user significant information to machine learning algorithm, created security authentication vector able to learn to provide with a method which the security authentication can be conducted in the field of virtualization. As the result of performance analysis, the interior transmission efficiency of authentication vector in virtualization environment, high efficiency of operation method, and safety regarding the major formation parameter were demonstrated.