• Title/Summary/Keyword: security requirement

Search Result 393, Processing Time 0.028 seconds

Republic of Korea Navy's Long-Term Development Plan to Acquire Operational Capabilities at Distant Ocean - Focused on Introduction of Aircraft Carrier and Nuclear-powered Submarine - (원양 작전 능력 확보를 위한 한국 해군의 장기(長期) 발전 방안 - 항공모함 및 원자력 잠수함 도입제안을 중심으로 -)

  • Kim, Jae-Yeop
    • Strategy21
    • /
    • s.34
    • /
    • pp.149-177
    • /
    • 2014
  • Today distant oceans around the world are regarded as a major 'global commons' for international trade and transportation. Korea is not an exception, because Korea hugely depends on sea lines of communication (SLOC) for supplying vital commodities such as food and energy resource. As a result, assuring a free and safe use of distant ocean beyond territory is also an important agenda for Korea's maritime security. However there are a number of challenges for Korea to enjoy a free and safe use of distant ocean; dangers of regional maritime conflict in East Asia, naval arms race of China and Japan, and concerns on possible decline of U.S naval presence and power projection capabilities. These factors provide a reasonable basis for Republic of Korea Navy (ROKN) to pursue capabilities for major naval operations at distant ocean in a long-term perspective toward the year 2030. The introduction of aircraft carrier and nuclear-powered submarine is a key requirement for achieving this goal. ROKN needs to acquire a 'multi-role strategic landing platform' type of light aircraft carrier, which takes a role to escort naval task force by providing air superiority at distant ocean. Additionally nuclear-powered submarine will offer ROKN a formidable power to carry out offensive missions effectively at distant ocean.

A Study on The Unsafe Packet Drop and Delay of Multimedia Traffics (멀터미디어 트래픽의 비보안 패킷 폐기와 지연에 관한 연구)

  • Lim Chung-Kyu
    • Journal of the Korea Society of Computer and Information
    • /
    • v.10 no.6 s.38
    • /
    • pp.227-232
    • /
    • 2005
  • A network of Packet based switch Mode will be required to carry the traffics(CVR,VBR, UBR, ABR) generated by a wide range of services. Packet based Network services the quality-of-Service (QoS) management of traffic sources and bandwidth. Besides efficiency and throughput services are achieved in the multimedia traffic sent in the network. In this paper. the scheduler transmits the safe packet, drop the unsafe packet and evaluate unsafe packet as the requirement of the delay avoiding the network congestion for improving the QoS of the multimedia network In this paper. we Propose the scheduling algorithm which evaluates and drops the packet . The suggested model performance of the switch is estimated and simulated in terms of the delay by computer.

  • PDF

High Security FeRAM-Based EPC C1G2 UHF (860 MHz-960 MHz) Passive RFID Tag Chip

  • Kang, Hee-Bok;Hong, Suk-Kyoung;Song, Yong-Wook;Sung, Man-Young;Choi, Bok-Gil;Chung, Jin-Yong;Lee, Jong-Wook
    • ETRI Journal
    • /
    • v.30 no.6
    • /
    • pp.826-832
    • /
    • 2008
  • The metal-ferroelectric-metal (MFM) capacitor in the ferroelectric random access memory (FeRAM) embedded RFID chip is used in both the memory cell region and the peripheral analog and digital circuit area for capacitance parameter control. The capacitance value of the MFM capacitor is about 30 times larger than that of conventional capacitors, such as the poly-insulator-poly (PIP) capacitor and the metal-insulator-metal (MIM) capacitor. An MFM capacitor directly stacked over the analog and memory circuit region can share the layout area with the circuit region; thus, the chip size can be reduced by about 60%. The energy transformation efficiency using the MFM scheme is higher than that of the PIP scheme in RFID chips. The radio frequency operational signal properties using circuits with MFM capacitors are almost the same as or better than with PIP, MIM, and MOS capacitors. For the default value specification requirement, the default set cell is designed with an additional dummy cell.

  • PDF

Does Microfinance Institution Has Institutional Properties to Generate Savings?

  • Mia, Md Aslam;Tabet, Imene
    • Asian Journal of Business Environment
    • /
    • v.6 no.3
    • /
    • pp.11-14
    • /
    • 2016
  • Purpose - Microfinance institutions (MFIs) in Bangladesh have been providing savings services to their clients at least for the past 15 years. However, whether an MFI should have institutional requirement(s) to be a deposit-taker generates interest among academics and policy makers. Thus, this short note aims to provide a brief overview of institutional properties of MFIs. Research Design, Data, and Methodology - This study used the existing literature and reports by the Microcredit Regulatory Authority' to investigate institutional properties of MFIs. In doing so, we have used 'institutional theory of saving' as a theoretical ground. Although the 'institutional theory of saving' has several important properties, the existing literature mostly discusses seven features such as information, incentives, facilitation, expectation, access, restrictions and security. Results - It is found that MFIs- in general- should have all the seven important institutional properties to be considered as an ideal savings institution. With regards to the microfinance sector in Bangladesh, this study supports that all the NGO-MFIs have these properties to be considered as an ideal deposit taker. Conclusions - The microfinance sector in Bangladesh needs to design and develop comprehensive and customer friendly savings products to further motivate the poor to save in MFIs.

Design of a Protocol to Delegate Signing Right for Multi-level Proxy Signature (다단계 대리서명을 위한 권한위임 프로토콜 설계)

  • Kim Seong-yeol
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.9 no.2
    • /
    • pp.361-365
    • /
    • 2005
  • Proxy signature schemes which allows original signer to delegate proxy signer to sign message on its behalf have a considerable amount of interest from researchers since Mambo[1] and have found many practical applications such as distributed network, Grid computing and electronic commerce. Araki[6] extended them to multi-level proxy signature. But it could not satisfy some security requirement. In this paper we propose a protocol to delegate signing right to another entity for multi-level proxy signature. Our protocol do not require secure channel and guarantee that nobody is able to repudiate delegation or acceptance of signing right, it is impossible for anyone to generate signature except designed and original signer can withdraw the delegation before expiration if it is necessary.

Implementing a Light-Weight Authentication Protocol for Resource-Constraint Mobile Device in Ubiquitous Environment (유비쿼터스 환경에서 제한적인 능력을 갖는 이동장치를 위한 경량의 인증 프로토콜 구현)

  • Lim, Kyu-Sang;You, Il-Sun
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2007.06a
    • /
    • pp.823-826
    • /
    • 2007
  • In ubiquitous environment, mobile devices, which users carry, tend to be resource-constraint, thus resulting in the need for an authentication protocol, which provides light-weight computations as well as strong security. Recently S/Key based protocols, which satisfy such a requirement by achieving light-weight computations, strong authentication and session key exchange, have been proposed. In particular, You and Jung's protocol is more efficient and secure than others. In this paper, we compare and analyze You-Jung with other protocols. Also, we design an authentication scenario and status of mobile devices while implementing the protocol.

  • PDF

A Study on The UnSafe Packet Drop and Delay of Multimedia Traffics (멀티미디어 트래픽의 비보안 패킷 폐기와 지연에 관한 연구)

  • Lim Chung-Tyu
    • Journal of the Korea Society of Computer and Information
    • /
    • v.10 no.5 s.37
    • /
    • pp.245-250
    • /
    • 2005
  • A network of Packet based switch Mode will be required to carry the traffics(CVR,VBR, UBR, ABR) generated by a wide range of services. Packet based Network services the Qualify-of-Service (QoS) management of traffic sources and bandwidth. Besides efficiency and throughput services are achieved in the multimedia traffic sent in the network. In this paper, the scheduler transmits the safe packet, drop the unsafe packet and evaluate unsafe Packet as the requirement of the delay avoiding the network congestion for improving the QoS of the multimedia network. In this paper, we Propose the scheduling algorithm which evaluates and drops the packet The suggested model Performance of the switch is estimated and simulated in terms of the delay by computer.

  • PDF

Efficient Offered Contents Using Broadcast Encryption (브로드캐스트 암호화를 이용한 효율적인 컨텐츠 제공)

  • 이덕규;이임영
    • Proceedings of the Korea Information Assurance Society Conference
    • /
    • 2004.05a
    • /
    • pp.65-70
    • /
    • 2004
  • The method of broadcast encryption has been applied to the transmission of digital information such as multimedia, software, and paid TV on the open network. In this broadcast encryption method, only previously authorized users can gain access to digital information. When broadcast message is transmitted, authorized users can first decode the session key using the previously given private key and get digital information using this session key. This way, users retrieve a message or a session key using the key transmitted by broadcasters. For their part, broadcasters need to generate and distribute keys. Broadcasters should also carry out efficient key renewal when users subscribe or un-subscriber. In this paper use a broadcast, and present the DRM model, using that look into the requirement about the contents and apply also the concept of a broadcast encryption. We offer the authority to copy as the number of reproduction to want to the user, and the low so that we were convenient because we used.

  • PDF

A New Watermarking Algorithm Using the Edge and PN Code (에지와 대역확산기술을 이용한 디지털 워터마킹 기법)

  • Song Sang-Ju;Lee Doo-Sung
    • Journal of the Korea Society of Computer and Information
    • /
    • v.9 no.4 s.32
    • /
    • pp.13-18
    • /
    • 2004
  • In this paper, we proposed a new digital watermarking technique. It uses frequency domain of discrete wavelet transform(DWT). watermarking technique is one of the most important tools for DRM(Digital Right Management) We proposed a new algorithm watermark insertion and detection. This technique cleats the watermark sequence using the edge image, spread spectrum technique and DWT. We tested the technique with various attacks. and found that it satisfies the watermarking evaluation criteria. Cox similarity measurement value is more than 6 on the Lena image and PSNR is more than 40dB on JPEG, Collusion. Clopping and Scatting. By the result, we proved that the new technique satisfies the requirement of Digital contents distribution, which are undeletablility tenacity, statistical undetectablility.

  • PDF

Lightweight Acknowledgement-Based Method to Detect Misbehavior in MANETs

  • Heydari, Vahid;Yoo, Seong-Moo
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.9 no.12
    • /
    • pp.5150-5169
    • /
    • 2015
  • Mobile Ad hoc NETworks (MANETs) are the best choice when mobility, scalability, and decentralized network infrastructure are needed. Because of critical mission applications of MANETs, network security is the vital requirement. Most routing protocols in MANETs assume that every node in the network is trustworthy. However, due to the open medium, the wide distribution, and the lack of nodes' physical protection, attackers can easily compromise MANETs by inserting misbehaving nodes into the network that make blackhole attacks. Previous research to detect the misbehaving nodes in MANETs used the overhearing methods, or additional ACKnowledgement (ACK) packets to confirm the reception of data packets. In this paper a special lightweight acknowledgement-based method is developed that, contrary to existing methods, it uses ACK packets of MAC layer instead of adding new ACK packets to the network layer for confirmations. In fact, this novel method, named PIGACK, uses ACK packets of MAC 802.11 to piggyback confirmations from a receiver to a sender in the same transmission duration that the sender sends a data packet to the receiver. Analytical and simulation results show that the proposed method considerably decreases the network overhead and increases the packet delivery ratio compared to the well-known method (2ACK).