• Title/Summary/Keyword: strength of security

Search Result 281, Processing Time 0.026 seconds

The Future War in the 21st Century and the Groundwork for the Korean Style Military Thought (21세기 미래전과 한국적 군사사상 형성의 조건)

  • Kim, Kwang-Soo
    • Journal of National Security and Military Science
    • /
    • s.7
    • /
    • pp.55-89
    • /
    • 2009
  • This article aims to critically review recent U. S. RMA-centered theories of warfare having prevailed after the 1991-92 Gulf War upon which the current ROKA military transformation project, the Vision 2020, largely based. In order to evaluate validity as a universal warfighing theory of NCW (Network Centric Warfare) and EBO (Effects-Based Operations), this article reviews the intrinsic strength and weakness of the theories as well as results of several recent wars that the U. S. Army conducted based on doctrines derived form such theories, In addition, this article examines the impact of certain military technology or weapon system in some well-known historical wars to draw lessons regarding the relationship between technology(weapon system) and military victory. Historical examples has shown that victories in war were not achieved by new technologies alone in most cases. Rather military victories tended to owe to combination of new technology, original doctrine and well conceived organization. Although the U. S. Armed Forces showed brilliant records of operational successes anchored on the system of PGMs and NCW concepts in Iraq (1991-92; 2003) and Afghanistan (2001-02), it must be pointed out that the operational successes did not bring about political ones in cases of Iraq and Afghanistan. It reminds us of perils of too technologically tilted approach to the conduct of war. In sum, one ought to recognize that superior technology nowadays became a necessary condition of success but is not yet a sufficient condition, the ROKA needs to be abreast with development trends of military technologies and related theoretical concepts, it need not too be in a hurry in adopting cutting edged war-making technologies at the expense of large amount of budget. The essay recommends for the ROKA several basic requirements for coping with conduct of future wars as well as establishing a 'Korean style military thought'; (1) Recognition of importance of technology in conduct of war; (2) Imposition of officer self-study hours in working days; (3) Establishing a lifestyle of military professionalism in the Korean officer corps; (4) Setting up small or large groups of think-tanks that are specialized in army doctrinal formulation.

  • PDF

Extracting the Risk Factor of Ground Excavation Construction and Confidence Analysis using Statistical Test Procedure (지반굴착공사 위험요소 도출 및 통계적 검정 방법을 통한 신뢰성 분석)

  • Kim, Dong-Min;Kim, Woo-Seok;Baek, Yong
    • Journal of Korean Society of Disaster and Security
    • /
    • v.10 no.1
    • /
    • pp.11-17
    • /
    • 2017
  • The case study on ground subsidence was conducted and the cause of ground subsidence was evaluated, main cause were insufficient site exploration, inaccurate strength parameters, defective temporary wall, insufficient reaction for boiling and heaving, excessive excavation and so on. Risk factors during excavation were identified from the cause of ground subsidence and risk factors were site exploration, selecting excavation method, structure analysis, measurement plan, excavation method construction, underground water level change, natural disaster and construction management. The survey of the experts on risk factors identified was conducted to evaluate the importance of risk factors, and confidence analysis was performed to evaluate the significance level between survey result and survey respondent using Chi-square Test.

Distributed Matching Algorithms for Spectrum Access: A Comparative Study and Further Enhancements

  • Ali, Bakhtiar;Zamir, Nida;Ng, Soon Xin;Butt, Muhammad Fasih Uddin
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.12 no.4
    • /
    • pp.1594-1617
    • /
    • 2018
  • In this paper, we consider a spectrum access scenario which consists of two groups of users, namely Primary Users (PUs) and Secondary Users (SUs) in Cooperative Cognitive Radio Networks (CCRNs). SUs cooperatively relay PUs messages based on Amplify-and-Forward (AF) and Decode-and-Forward (DF) cooperative techniques, in exchange for accessing some of the spectrum for their secondary communications. From the literatures, we found that the Conventional Distributed Algorithm (CDA) and Pragmatic Distributed Algorithm (PDA) aim to maximize the PU sum-rate resulting in a lower sum-rate for the SU. In this contribution, we have investigated a suit of distributed matching algorithms. More specifically, we investigated SU-based CDA (CDA-SU) and SU-based PDA (PDA-SU) that maximize the SU sum-rate. We have also proposed the All User-based PDA (PDA-ALL), for maximizing the sum-rates of both PU and SU groups. A comparative study of CDA, PDA, CDA-SU, PDA-SU and PDA-ALL is conducted, and the strength of each scheme is highlighted. Different schemes may be suitable for different applications. All schemes are investigated under the idealistic scenario involving perfect coding and perfect modulation, as well as under practical scenario involving actual coding and actual modulation. Explicitly, our practical scenario considers the adaptive coded modulation based DF schemes for transmission flexibility and efficiency. More specifically, we have considered the Self-Concatenated Convolutional Code (SECCC), which exhibits low complexity, since it invokes only a single encoder and a single decoder. Furthermore, puncturing has been employed for enhancing the bandwidth efficiency of SECCC. As another enhancement, physical layer security has been applied to our system by introducing a unique Advanced Encryption Standard (AES) based puncturing to our SECCC scheme.

AVK based Cryptosystem and Recent Directions Towards Cryptanalysis

  • Prajapat, Shaligram;Sharma, Ashok;Thakur, Ramjeevan Singh
    • Journal of Internet Computing and Services
    • /
    • v.17 no.5
    • /
    • pp.97-110
    • /
    • 2016
  • Cryptanalysis is very important step for auditing and checking strength of any cryptosystem. Some of these cryptosystem ensures confidentiality and security of large information exchange from source to destination using symmetric key cryptography. The cryptanalyst investigates the strengths and identifies weakness key as well as enciphering algorithm. With increase in key size the time and effort required to guess the correct key increases so trend is increase key size from 8, 16, 24, 32, 56, 64, 128 and 256 bits to strengthen the cryptosystem and thus algorithm continues without compromise on the cost of time and computation. Automatic Variable Key (AVK) approach is an alternative to the approach of fixing up key size and adding security level with key variability adds new dimension in the development of secure cryptosystem. Likewise, whenever any new cryptographic method is invented to replace per-existing vulnerable cryptographic method, its deep analysis from all perspectives (Hacker / Cryptanalyst as well as User) is desirable and proper study and evaluation of its performance is must. This work investigates AVK based cryptic techniques, in future to exploit benefits of advances in computational methods like ANN, GA, SI etc. These techniques for cryptanalysis are changing drastically to reduce cryptographic complexity. In this paper a detailed survey and direction of development work has been conducted. The work compares these new methods with state of art approaches and presents future scope and direction from the cryptic mining perspectives.

Kriging Regressive Deep Belief WSN-Assisted IoT for Stable Routing and Energy Conserved Data Transmission

  • Muthulakshmi, L.;Banumathi, A.
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.7
    • /
    • pp.91-102
    • /
    • 2022
  • With the evolution of wireless sensor network (WSN) technology, the routing policy has foremost importance in the Internet of Things (IoT). A systematic routing policy is one of the primary mechanics to make certain the precise and robust transmission of wireless sensor networks in an energy-efficient manner. In an IoT environment, WSN is utilized for controlling services concerning data like, data gathering, sensing and transmission. With the advantages of IoT potentialities, the traditional routing in a WSN are augmented with decision-making in an energy efficient manner to concur finer optimization. In this paper, we study how to combine IoT-based deep learning classifier with routing called, Kriging Regressive Deep Belief Neural Learning (KR-DBNL) to propose an efficient data packet routing to cope with scalability issues and therefore ensure robust data packet transmission. The KR-DBNL method includes four layers, namely input layer, two hidden layers and one output layer for performing data transmission between source and destination sensor node. Initially, the KR-DBNL method acquires the patient data from different location. Followed by which, the input layer transmits sensor nodes to first hidden layer where analysis of energy consumption, bandwidth consumption and light intensity are made using kriging regression function to perform classification. According to classified results, sensor nodes are classified into higher performance and lower performance sensor nodes. The higher performance sensor nodes are then transmitted to second hidden layer. Here high performance sensor nodes neighbouring sensor with higher signal strength and frequency are selected and sent to the output layer where the actual data packet transmission is performed. Experimental evaluation is carried out on factors such as energy consumption, packet delivery ratio, packet loss rate and end-to-end delay with respect to number of patient data packets and sensor nodes.

A Study on the Methodology to Performance Security on the Korea Small/Medium Sized Construction Firms for Venturing into International Market (국내 중소건설업체의 해외 진출 활성화를 위한 건설 보증 확대 방안에 관한 연구)

  • Ahn, Hyoung-Jun;Kim, Ju-Hyung;Kim, Jae-Jun
    • Proceedings of the Korean Institute of Building Construction Conference
    • /
    • 2009.11a
    • /
    • pp.225-229
    • /
    • 2009
  • International construction market has been open to other countries, and it derives the development of our overseas construction industry quantitatively as well as qualitatively. Until now, the major companies have an absolute majority in the overseas construction market, and the small and medium enterprises have had difficulty to get a leadership in the international construction market because of the lack of the technical expertise and the capital strength. Especially in the Middle East Asia, our construction companies has touched off a boom, so our market share also has grown, which derived from the up toward ratchet oil prices and a worldwide boom in real estate development. The small and medium enterprise minority have recognition that the overseas construction market is the major company's native territory. But Data from the existing researches and many statistics indicate the most companies tend to underestimate the capacity and international competitiveness of the small and medium enterprises. As a matter of fact, hundreds of small and medium enterprise cut a conspicuous figure in overseas market. Consequently, it is indispensable to overcome the international financial crisis by revitalizing our overseas construction industry which obtains excellent results in international market. this study suggested the ways to expand overseas bonding capacity of Korean financial institution. This study proposed the Korean government to allow Construction Guarantee (former Korea Construction Financial Cooperative) to deal with foreign exchange so that Construction Guarantee will underwrite the overseas construction bond.

  • PDF

Differential Privacy Technology Resistant to the Model Inversion Attack in AI Environments (AI 환경에서 모델 전도 공격에 안전한 차분 프라이버시 기술)

  • Park, Cheollhee;Hong, Dowon
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.29 no.3
    • /
    • pp.589-598
    • /
    • 2019
  • The amount of digital data a is explosively growing, and these data have large potential values. Countries and companies are creating various added values from vast amounts of data, and are making a lot of investments in data analysis techniques. The privacy problem that occurs in data analysis is a major factor that hinders data utilization. Recently, as privacy violation attacks on neural network models have been proposed. researches on artificial neural network technology that preserves privacy is required. Therefore, various privacy preserving artificial neural network technologies have been studied in the field of differential privacy that ensures strict privacy. However, there are problems that the balance between the accuracy of the neural network model and the privacy budget is not appropriate. In this paper, we study differential privacy techniques that preserve the performance of a model within a given privacy budget and is resistant to model inversion attacks. Also, we analyze the resistance of model inversion attack according to privacy preservation strength.

Towards efficient sharing of encrypted data in cloud-based mobile social network

  • Sun, Xin;Yao, Yiyang;Xia, Yingjie;Liu, Xuejiao;Chen, Jian;Wang, Zhiqiang
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.10 no.4
    • /
    • pp.1892-1903
    • /
    • 2016
  • Mobile social network is becoming more and more popular with respect to the development and popularity of mobile devices and interpersonal sociality. As the amount of social data increases in a great deal and cloud computing techniques become developed, the architecture of mobile social network is evolved into cloud-based that mobile clients send data to the cloud and make data accessible from clients. The data in the cloud should be stored in a secure fashion to protect user privacy and restrict data sharing defined by users. Ciphertext-policy attribute-based encryption (CP-ABE) is currently considered to be a promising security solution for cloud-based mobile social network to encrypt the sensitive data. However, its ciphertext size and decryption time grow linearly with the attribute numbers in the access structure. In order to reduce the computing overhead held by the mobile devices, in this paper we propose a new Outsourcing decryption and Match-then-decrypt CP-ABE algorithm (OM-CP-ABE) which firstly outsources the computation-intensive bilinear pairing operations to a proxy, and secondly performs the decryption test on the attributes set matching access policy in ciphertexts. The experimental performance assessments show the security strength and efficiency of the proposed solution in terms of computation, communication, and storage. Also, our construction is proven to be replayable choosen-ciphertext attacks (RCCA) secure based on the decisional bilinear Diffie-Hellman (DBDH) assumption in the standard model.

Multiplication optimization technique for Elliptic Curve based sensor network security (Elliptic curve기반 센서네트워크 보안을 위한 곱셈 최적화 기법)

  • Seo, Hwa-Jeong;Kim, Ho-Won
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.14 no.8
    • /
    • pp.1836-1842
    • /
    • 2010
  • Sensor network, which is technology to realize the ubiquitous environment, recently, could apply to the field of Mechanic & electronic Security System, Energy management system, Environment monitoring system, Home automation and health care application. However, feature of wireless networking of sensor network is vulnerable to eavesdropping and falsification about message. Presently, PKC(public key cryptography) technique using ECC(elliptic curve cryptography) is used to build up the secure networking over sensor network. ECC is more suitable to sensor having restricted performance than RSA, because it offers equal strength using small size of key. But, for high computation cost, ECC needs to enhance the performance to implement over sensor. In this paper, we propose the optimizing technique for multiplication, core operation in ECC, to accelerate the speed of ECC.

A Message Authentication Scheme for V2V message based on RSSI with anonymity (익명성을 제공하는 RSSI기반 V2V 메시지 인증기법)

  • Seo, Hwa-Jeong;Kim, Ho-Won
    • The KIPS Transactions:PartC
    • /
    • v.18C no.4
    • /
    • pp.207-212
    • /
    • 2011
  • Vehicular Ad Hoc Network(VANET) is a communication technology between vehicles and vehicles(V2V) or vehicles and infrastructures(V2I) for offering a number of practical applications. Considering the importance of communicated information through VANET, data authentication, confidentiality and integrity are fundamental security elements. Recently, to enhance a security of VANET in various circumstances, message authentication is widely researched by many laboratories. Among of them, Zhang. et. al. is an efficient method to authenticate the message with condition of anonymity in dense space. In the scheme, to obtain the vehicular ID with condition of anonymity, the k-anonymity is used. However it has a disadvantage, which conducts hash operations in case of determining the vehicular ID. In the paper, we present a location based algorithm using received signal strength for the location based authentication and encryption technique as well, and to enhance the accuracy of algorithm we apply a location determination technique over the 3-dimensional space.