• Title/Summary/Keyword: integrity checking

Search Result 61, Processing Time 0.035 seconds

A Sextant Cluster Based Monitoring on Secure Data Aggregation and Filtering False Data in Wireless Sensor Networks (무선센서 네트워크에서의 육분원 방식 모니터링 기반 안전한 데이터 병합 및 위조 데이터 필터링)

  • Boonsongsrikul, Anuparp;Park, Seung-Kyu;Shin, Seung-Hun
    • Journal of the Korea Society of Computer and Information
    • /
    • v.17 no.2
    • /
    • pp.119-126
    • /
    • 2012
  • Local monitoring is an effective technique in securing data of wireless sensor networks. Existing solutions require high communication cost for detecting false data and this results in a network lifetime being shortened. This paper proposes novel techniques of monitoring based secure data aggregation and filtering false data in wireless sensor networks. The aim is to reduce energy consumption in securing data aggregation. An aggregator and its monitoring node perform data aggregation in a 60o sextant cluster. By checking Message Authentication Codes (MAC), aggregation data will be dropped by a forward aggregator if data aggregated by the aggregator and data monitored by the monitoring node are inconsistent. The simulation shows that the proposed protocol can reduce the amount of average energy consumption about 64% when comparing with the Data Aggregation and Authentication protocol (DAA)[1]. Additionally, the network lifetime of the proposed protocol is 283% longer than that of DAA without any decline in data integrity.

Modeling Element Relations as Structured Graphs Via Neural Structured Learning to Improve BIM Element Classification (Neural Structured Learning 기반 그래프 합성을 활용한 BIM 부재 자동분류 모델 성능 향상 방안에 관한 연구)

  • Yu, Youngsu;Lee, Koeun;Koo, Bonsang;Lee, Kwanhoon
    • KSCE Journal of Civil and Environmental Engineering Research
    • /
    • v.41 no.3
    • /
    • pp.277-288
    • /
    • 2021
  • Building information modeling (BIM) element to industry foundation classes (IFC) entity mappings need to be checked to ensure the semantic integrity of BIM models. Existing studies have demonstrated that machine learning algorithms trained on geometric features are able to classify BIM elements, thereby enabling the checking of these mappings. However, reliance on geometry is limited, especially for elements with similar geometric features. This study investigated the employment of relational data between elements, with the assumption that such additions provide higher classification performance. Neural structured learning, a novel approach for combining structured graph data as features to machine learning input, was used to realize the experiment. Results demonstrated that a significant improvement was attained when trained and tested on eight BIM element types with their relational semantics explicitly represented.

Implementation of Main Computation Board for Safety Improvement of railway system (철도시스템의 안전성 향상을 위한 주연산보드 구현)

  • Park, Joo-Yul;Kim, Hyo-Sang;Lee, Joon-Hwan;Kim, Bong-Taek;Chung, Ki-Seok
    • Proceedings of the KSR Conference
    • /
    • 2011.05a
    • /
    • pp.1195-1201
    • /
    • 2011
  • Since the release of safety standard IEC 61508 which defines functional safety of electronic safety-related systems, SIL(Safety Integrity Level) certification for railway systems has gained lots of attention lately. In this paper, we propose a new design technique of the computer board for train control systems with high reliability and safety. The board is designed with TMR(Triple Modular Redundancy) using a certified SIL3 Texas Instrument(TI)'s TMS570 MCU(Micro-Controller Unit) to guarantee safety and reliability. TMR for the control device is implemented on FPGA(Field Programmable Gate Array) which integrates a comparator, a CAN(Controller Area Network) communication module, built-in self-error checking, error discriminant function to improve the reliability of the board. Even if a malfunction of a processing module occurs, the safety control function based on the proposed technique lets the system operate properly by detecting and masking the malfunction. An RTOS (Real Time Operation System) called FreeRTOS is ported on the board so that reliable and stable operation and convenient software development can be provided.

  • PDF

A Secure Medical Information Management System for Wireless Body Area Networks

  • Liu, Xiyao;Zhu, Yuesheng;Ge, Yu;Wu, Dajun;Zou, Beiji
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.10 no.1
    • /
    • pp.221-237
    • /
    • 2016
  • The wireless body area networks (WBANs) consist of wearable computing devices and can support various healthcare-related applications. There exist two crucial issues when WBANs are utilized for healthcare applications. One is the protection of the sensitive biometric data transmitted over the insecure wireless channels. The other is the design of effective medical management mechanisms. In this paper, a secure medical information management system is proposed and implemented on a TinyOS-based WBAN test bed to simultaneously address these two issues. In this system, the electronic medical record (EMR) is bound to the biometric data with a novel fragile zero-watermarking scheme based on the modified visual secret sharing (MVSS). In this manner, the EMR can be utilized not only for medical management but also for data integrity checking. Additionally, both the biometric data and the EMR are encrypted, and the EMR is further protected by the MVSS. Our analysis and experimental results demonstrate that the proposed system not only protects the confidentialities of both the biometric data and the EMR but also offers reliable patient information authentication, explicit healthcare operation verification and undeniable doctor liability identification for WBANs.

Development of a Simulation Scenario on Emergency Nursing Care of Dyspnea Patients (간호사를 위한 호흡곤란 응급관리 시뮬레이션 시나리오 개발)

  • Kang, Hye-Won;Hur, Hea-Kung
    • Journal of Korean Critical Care Nursing
    • /
    • v.3 no.2
    • /
    • pp.61-76
    • /
    • 2010
  • Purpose: This study was aimed to construct an algorithm of dyspnea emergency care and develop a simulation scenario for emergency care of dyspnea based on the algorithm. Methods: The first stage of this methodological study was to construct a preliminary algorithm based on a literature review, and content and clinical validity were established. Reflecting the result of content and clinical validity for this preliminary algorithm, simulation scenario was developed based on the modified Bay Area Simulation Collaborative scenario template. The content validity of this scenario was established, and clinical applicability was tested by applying this scenario to nurses. Results: The final simulation scenario of emergency care of dyspnea consisted of scenario overview, curricular integrity, and scenario script. The scenario was proceeded on 7 phases of the algorithm as follows; initial assessment, immediate emergency care, reassessment of dyspnea, monitoring respiratory failure, checking pulse if respiratory failure occurs, decision making on cardiopulmonary resuscitation or intubation, determining a differential diagnosis according to origin of dyspnea. Conclusion: The simulation scenario of emergency care of dyspnea developed in this study may provide a strategy of simulation education for emergency care of dyspnea for nurses.

  • PDF

The Knowledge Definition Language and Knowledge Creation for Knowledge Base Construction (지식베이스 구축을 위한 지실정의 언어와 지식생성)

  • 김창화;백두권
    • Journal of the Korean Operations Research and Management Science Society
    • /
    • v.14 no.2
    • /
    • pp.27-42
    • /
    • 1989
  • REA (Restricted Entity Aspect) model is a knowledge representation model to classify the aspect type, the EA model component, into five aspects (IS-A-aspect, A-PART-OF aspect, attribute aspect, role aspect, and operation aspect). EATPS, the knowledge representation system, consists of user interface module, knowledge creation module, instance management module, schema management module, and integrity checking module. EATPS creates and manages interactively REA model based knowledge base. This paper shows the structure and functions of EATPS, the design and interactive construction of the knowledge definition language EAKDL, the functions and algorithm of class creation module, and the functions and algorithm of instance creation module to include inheritance inference mechanism.

  • PDF

A design process of central stations for GNSS based land transportation infrastructure network (육상교통 사용자를 위한 위성항법기반 중앙국 시스템 설계 및 구현)

  • Son, Min-Hyuk;Kim, Gue-Heon;Heo, Moon-Bum
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2012.10a
    • /
    • pp.374-377
    • /
    • 2012
  • GNSS(Global Navigation Satellite System) based land transportation infrastructure system is consists of receiving station and central station. The functions of the central system include receiving station's data gathering and decoding, carrier correction and integrity information generated, transmission of data in real-time. In general, The central station architecture should take into account various important points relating to hardware/software of system, data archiving and checking, availability and continuity of operation, etc. There is a fundamental need for a generic design capable of being used in any situation. Also, There is need to develop an expandable and interoperable central station architecture. In this paper, the process of design and manufacture and verification will be introduced.

  • PDF

Enhancing the Session Security of Zen Cart based on HMAC-SHA256

  • Lin, Lihui;Chen, Kaizhi;Zhong, Shangping
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.11 no.1
    • /
    • pp.466-483
    • /
    • 2017
  • Zen Cart is an open-source online store management system. It is used all over the world because of its stability and safety. Today, Zen Cart's session security mechanism is mainly used to verify user agents and check IP addresses. However, the security in verifying the user agent is lower and checking the IP address can affect the user's experience. This paper, which is based on the idea of session protection as proposed by Ben Adida, takes advantage of the HTML5's sessionStorage property to store the shared keys that are used in HMAC-SHA256 encryption. Moreover, the request path, current timestamp, and parameter are encrypted by using HMAC-SHA256 in the client. The client then submits the result to the web server as per request. Finally, the web server recalculates the HMAC-SHA256 value to validate the request by comparing it with the submitted value. In this way, the Zen Cart's open-source system is reinforced. Owing to the security and integrity of the HMAC-SHA256 algorithm, it can effectively protect the session security. Analysis and experimental results show that this mechanism can effectively protect the session security of Zen Cart without affecting the original performance.

A Study of Logical Network Partition and Behavior-based Detection System Using FTS (FTS를 이용한 논리적 망 분리와 행위기반 탐지 시스템에 관한 연구)

  • Kim, MinSu;Shin, SangIl;Ahn, ChungJoon;Kim, Kuinam J.
    • Convergence Security Journal
    • /
    • v.13 no.4
    • /
    • pp.109-115
    • /
    • 2013
  • Security threats through e-mail service, a representative tool to convey information on the internet, are on the sharp rise. The security threats are made in the path where malicious codes are inserted into documents files attached and infect users' systems by taking advantage of the weak points of relevant application programs. Therefore, to block infection of camouflaged malicious codes in the course of file transfer, this work proposed an integrity-checking and behavior-based detection system using File Transfer System (FTS), logical network partition, and conducted a comparison analysis with the conventional security techniques.

Intrusion Detection Using Log Server and Support Vector Machines

  • Donghai Guan;Donggyu Yeo;Lee, Juwan;Dukwhan Oh
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2003.10a
    • /
    • pp.682-684
    • /
    • 2003
  • With the explosive rapid expansion of computer using during the past few years, security has become a crucial issue for modem computer systems. Today, there are many intrusion detection systems (IDS) on the Internet. A variety of intrusion detection techniques and tools exist in the computer security community such as enterprise security management system (ESM) and system integrity checking tools. However, there is a potential problem involved with intrusion detection systems that are installed locally on the machines to be monitored. If the system being monitored is compromised, it is quite likely that the intruder will after the system logs and the intrusion logs while the intrusion remains undetected. In this project KIT-I, we adopt remote logging server (RLS) mechanism, which is used to backup the log files to the server. Taking into account security, we make use of the function of SSL of Java and certificate authority (CA) based key management. Furthermore, Support Vector Machine (SVM) is applied in our project to detect the intrusion activities.

  • PDF