Skip to main content
Log in

A Study on Convergence Security System for Preventing Leakage of Internal Information

  • Published:
Wireless Personal Communications Aims and scope Submit manuscript

Abstract

Real-time tracing system blocks the used ports such as FTP, messenger, cloud and etc. to detect abnormal symptom such as leakage of internal information inside based on location tracing of the visitors as well as the internal staffs and operates mail backup server for mail management together with TCP packet monitoring as IPS that tracks the positions of moving objects (human and properties) using passive RFID, and I am willing to suggest the study of convergence security system that can prevent the leakage of internal information and trace the person who leaks the information.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7

Similar content being viewed by others

References

  1. Popov, A. L., Vendik, O. G., & Zubova, N. A. (2010). Magnetic field intensity in near field zone of loop antenna for RFID systems. Technical Physics letters, SP MAIK Nauka/Interperiodica, 36(10), 882–884.

    Article  Google Scholar 

  2. Song, T. S., Kim, T. Y., & Lyou, J. (2008). Conformance evaluation method by successively applying self-running test mode in active RFID tag. Korean Institute of Electronics Engineers, 45(6), 204–212.

    Google Scholar 

  3. Rhee, S.-H., Chun, J. H., & Park, J. A. (2006). Performance improvement in passive tag based RFID reader. Korean Institute of Communication Sciences, 31(11A), 1159–1166.

    Google Scholar 

  4. Cole, P. H. (2003). Fundamentals in radio frequency identification.

  5. MCRF335/360 reader reference design, Microchip Technology Inc. (2001).

  6. De Paz, J. F., Tapia, D. I., Alonso, R. S., Pinzon, C. I., Bajo, J., & Corchado, J. M. (2012). Mitigation of the ground reflection effect in real-time locating systems based on wireless sensor networks by using artificial neural networks. Knowledge and Information Systems, Springer-Verlag, 34(1), 193–217.

    Google Scholar 

  7. De Vira, G., & Iannaccone, G. (2005). Design criteria for the RF section fo UHF and microwave passive RFID transponders. IEEE Transactions on Microwave Theory and Techniques, 53(9), 2978–2990.

    Article  Google Scholar 

  8. Stolfo, S. J., Bellovin, S. M., Keromytis, A. D., Sinclair, S., Smith, S. W., & Hershkop, S. (2008). Insider attack and cyber security beyond the hacker. Berlin: Springer.

    Book  Google Scholar 

  9. Eom, J. H., Park, S. H., & Chung, T. M. (2010). An architecture of access control model for preventing illegal information leakage by insider. Korea Institute of Information Security and Cryptology, 20(5), 59–67.

    Google Scholar 

  10. Seo, D. H., Beak, J. M., Lee, M. K., Yoon, M. Y., & Cho, D. S. (2010). Secure knowledge management for prevent illegal data leakage by internal users. Korean Society for Internet Information, 11(2), 73–84.

    Google Scholar 

  11. Lee, E. B., & Kim, K. Y. (2010). A study on the separate network based information security. 20(1), 39–46.

Download references

Acknowledgments

This work was supported by Kyonggi University’s Graduate Research Assistant Fellowship 2013.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Dong-hwi Lee.

Rights and permissions

Reprints and permissions

About this article

Cite this article

Kim, Ms., Lee, Dh. & Kim, Kn.J. A Study on Convergence Security System for Preventing Leakage of Internal Information. Wireless Pers Commun 73, 175–185 (2013). https://doi.org/10.1007/s11277-013-1228-3

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11277-013-1228-3

Keywords

Navigation