• Title/Summary/Keyword: 도어

Search Result 691, Processing Time 0.028 seconds

IoT Authentication System Using Blockchain and TOTP

  • Kim, Ho-Gyun;Jung, Soon-Ho
    • Journal of the Korea Society of Computer and Information
    • /
    • v.25 no.2
    • /
    • pp.113-122
    • /
    • 2020
  • In this paper, we propose the terminal authentication system using blockchain and TOTP(Time-based One-time Password Algorithm) to sustain a continuous authentication between user device and service device. And we experiment this system by using door-lock as a terminal of IoT(Internet of Things). In the future, we can apply this result to several devices of IoT for convenience and security. Although IoT devices frequently used everyday require convenience and security at the same time, it is difficult for IoT devices having features of the low-capacity and light-weight to apply the existing authentication technology requiring a high amount of computation. Blockchain technology having security and integrity have been used as a storage platform, but its authentication cannot be performed when the terminal cannot access any network. We show the method to solve this problem using Blockchain and TOPT.

A Study of Successful Factor on PSD Application Technique for Manual Operation Mode(ATS) (수동운전(ATS)구간에서 PSD 적용 기술의 성공적 요인 분석연구)

  • Son, Yeong-Jin;Park, Keun-Soo;Min, Kyung-Yun
    • Journal of the Korean Society for Railway
    • /
    • v.10 no.1 s.38
    • /
    • pp.57-66
    • /
    • 2007
  • 1974. 8. 15 SeoulMetro, beginning with the first electric railway established at six cities, so it is managing mass transportation of traffic. Especially, in case of seoul, It is managing that from one to eight lines, 286.9km, 265 stations have installed and now it is carrying about 5.5million of passengers everyday, and 2,000million passengers a year. So accident is increasing from the station every year. For this measure, SeoulMetro prepares safety fence for passengers crash but, as suicides or people who watch the accident took place, for at the bottom of passengers crash protection, PSD installing is needed. Even though, PSD is managing ATO section but, in controlling SeoulMetro, one to four lines sections are (ATS, ATC)section. Between as ATS, ATC section, ATO section, subway gate and PSD must have opened and crossed always at the time. And the interlock control corrosion protection gate, managing skills with installation, method, using in history, apply to 10rail cars one train sets, and maximum applying 2224% sections of passengers congested that consideration is to be needed. So 2004, SeoulMetro improved technology and basie design of PSD at ATS section. Based on this, from 2005.4 to 2006.6, using subway 2lines per 12stations set the model installation(full type 11stations, half type 1station) After installing in case of success, it is going about to suggest that effective analysis and hereafter subject.

Device Identification System for Corporate Internal Network Visibility in IoT Era (IoT 시대 기업 내부 네트워크의 가시성 확보를 위한 단말 식별 시스템 설계)

  • Lee, Dae-Hyo;Kim, Yong-Kwon;Lee, Dong-Bum;Kim, Hyeob
    • Convergence Security Journal
    • /
    • v.19 no.3
    • /
    • pp.51-59
    • /
    • 2019
  • In this paper, we propose a device identification system for network visibility that can maintain the secure internal network environment in the IoT era. Recently, the area of enterprise network is getting huge and more complicated. Not only desktops and smartphones but also business pads, barcode scanners, APs, Video Surveillance, digital doors, security devices, and lots of Internet of Things (IoT) devices are rapidly pouring into the business network, and there are highly risk of security threats. Therefore, in this paper, we propose the device identification system that includes the process and module-specific functions to identify the exploding device in the IoT era. The proposed system provides in-depth visibility of the devices and their own vulnerabilities to the IT manager in company. These information help to mitigate the risk of the potential cyber security threats in the internal network and offer the unified security management against the business risks.

A Study of Security Threats in Bluetooth v4.1 Beacon based Coupon Convergence Service (블루투스 v4.1 비콘 기반 쿠폰 융합서비스에서의 보안위협 연구)

  • Lee, Kwang-Jae;Lee, Keun-Ho
    • Journal of the Korea Convergence Society
    • /
    • v.6 no.2
    • /
    • pp.65-70
    • /
    • 2015
  • As the new technologies like IoT and Fintech appear which have not existed before, security threat ranges in existing system are increasing. Especially, IoT has increasing ranges to cause malicious behaviors in specific systems because related IT infrastructure ranges are increasing. Fintech also requires the innovation of traditional security system because it has new structure which didn't exist in the past. As IoT and Fintech technologies are commercialized and related markets are developing in the future, structural security threats could be connected to actual attacks and secondary attacks by the attackers' imbedding of back door in IoT internet devices through remote access. Customer's device cannot be compulsively controlled for security in new system where these various security threats exist. Therefore, these services should minimize the collected information, and now is the time to politically control the utilizing methods of the collected information. In this thesis, security threats are to be suggested which could occur in newly appearing mobile services like IoT and Fintech.

Development of an impact test device for Light-weight Automotive Reinforcements (자동차 보강재 경량화을 위한 충격 실험장치 개발)

  • Kim, Ick-Tae;Kang, Hyung-Sun
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.15 no.10
    • /
    • pp.5963-5967
    • /
    • 2014
  • Reducing the impact of collisions of cars is a major issue for reducing the injury and death of passengers. According to the statistical data of the Road Traffic Authority, the deaths from side collision accidents caused by the collision of passenger cars is greater than the deaths from head-on collision accidents. To accommodate this, vehicle designers have added a reinforcing material called the impact frame and impact beam on the inside of the door. Many experiments are needed to develop the door impact beam. These reinforcements to develop a collision experiment is essential. Collision experiments are costly and time consuming. This study used a drop Impactor to obtain the impulse and a strain experimental device was developed for this purpose. The economic costs were reduced and the ideal experiment device configuration was determined. A comparison of the experimental results with numerical value analysis revealed $3.5{\tiimes}10-3sec$ strain ranging from $3.49{\tiimes}10-3$ to $3.99{\tiimes}10-3$.

A Study on Simulation of Cavity and Relaxation Zone Using Laboratory Model Test and Discrete Element Method (실내모형실험과 개별요소법을 이용한 지반 공동 및 이완영역 모사에 관한 연구)

  • Kim, Joo-Bong;You, Seung-Kyong;Han, Jung-Geun;Hong, Gi-Gwon;Park, Jong-Beom
    • Journal of the Korean Geosynthetics Society
    • /
    • v.16 no.2
    • /
    • pp.11-21
    • /
    • 2017
  • Ground subsidence mainly occurs due to the soil wash-away caused by cracked sewer pipes. It is necessary to understand the behavior surrounding soils with the formation of cavity and relaxation zone to set up counterplan. In this paper, a series of laboratory model tests and numerical analyses (Discrete Element Method) were performed to investigate the ground subsidence mechanism due to sewer pipe damage. For model tests, aluminum rod and trap door were used to simulate the behavior of model ground. Test results were compared with the numerical analyses conducted under the same boundary conditions with model tests. From this study, it was investigated the shape and size of cavity and relaxation zone due to the soil wash-away and a void ratio distribution of surrounding soils with relaxation properties.

Active Slope Weighted-Constraints Based DTW Algorithm for Environmental Sound Recognition System (능동형 기울기 가중치 제약에 기반한 환경소리 인식시스템용 DTW 알고리듬)

  • Jung, Young-Jin;Lee, Yun-Jung;Kim, Pil-Un;Kim, Myoung-Nam
    • Journal of Korea Multimedia Society
    • /
    • v.11 no.4
    • /
    • pp.471-480
    • /
    • 2008
  • The deaf can not recognize useful sound informations such as alarm, doorbell, siren, car horn, and phone ring etc., because they have the hearing impairment. To solve this problems, portable hearing assistive devices which have suitable environment sound recognition methods are needed. In this paper, the DTW algorithm for sound recognition system with new active slope weighting constraint method was proposed. The environment sound recognition methods consist of three processes. First process is extraction of start point and end point using frequency and amplitude of sound. Second process is extraction of features and third process is classification of features for given segments. As a result of the experiment, the recognition rate of the proposed method is over 90%. And, the recognition rate of the proposed method increased about 20% than the conventional algorithm. Therefore if there are developed portable assistive devices which use developed method to recognize environment sound for hearing-impaired persons, they could be more convenient in life.

  • PDF

Application of Spaceborne Earth Remote Sensing Information (인공위성 원격탐사 정보의 활용)

  • 가민호
    • Korean Journal of Remote Sensing
    • /
    • v.16 no.3
    • /
    • pp.261-279
    • /
    • 2000
  • Today, the development of spaceborne Earth remote sensing is characterised by the increasing number and various types of remote sensing satellites, which are being operated in the low altitude and geostationary orbits with the help of rapid development of modern space technologies. It is believed that around 15 countries have programs to own their spaceborne Earth remote sensing systems, and the number of systems will be reached to some tens until the end of 2000 years. It is expected that Korean remote sensing satellites will be launched in sequence according to the national space program. The befinits will be magnificient because of the wide range of application area. Application of remote sensing information to the social infra implies that the potential customers can access the information, mission and the characteristics of the operation, and it is necessary to be supplied more information about systems and mission areas to our domestic users for proper applications. In this review we will survey the applications of the information acquired by the systems of USA, Russia and other countries. In this review we will discussed withing general application area, missions and systems.

A Study on Group Key Generation and Exchange using Hash Collision in M2M Communication Environment (M2M 통신 환경에서 해시 충돌을 이용한 그룹키 생성 및 교환 기법 연구)

  • Song, Jun-Ho;Kim, Sung-Soo;Jun, Moon-Seog
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.19 no.5
    • /
    • pp.9-17
    • /
    • 2019
  • As the IoT environment becomes more popular, the safety of the M2M environment, which establishes the communication environment between objects and objects without human intervention, becomes important. Due to the nature of the wireless communication environment, there is a possibility of exposure to security threats in various aspects such as data exposure, falsification, tampering, deletion and privacy, and secure communication security technology is considered as an important requirement. In this paper, we propose a new method for group key generation and exchange using trap hash collision hash in existing 'M2M communication environment' using hash collision, And a mechanism for confirming the authentication of the device and the gateway after the group key is generated. The proposed method has attack resistance such as spoofing attack, meson attack, and retransmission attack in the group communication section by using the specificity of the collision message and collision hash, and is a technique for proving safety against vulnerability of hash collision.

The Effect of Elderly Sports Activities Participation Motivation on Leisure Satisfaction (노인의 스포츠 활동 참여동기가 여가만족에 미치는 영향)

  • Oh, Kyung-A;Kim, Hwa-Ryong
    • Journal of the Korean Applied Science and Technology
    • /
    • v.35 no.4
    • /
    • pp.1295-1306
    • /
    • 2018
  • The purpose of this study was to verify the effect of elderly sports activities participation motivation on Leisure Satisfaction The participants were from elderly who the daily sports program. A total of 250 questionnaires were distributed from Sep. 1 to Oct. 31, 2018 and, after excluding 53 questionnaires that had missed or inappropriate answers thus low reliability, 197 questionnaires were included in effective sample. The collected data were analyzed using SPSS Statistics 21 and frequency analysis, exploratory factor analysis, reliability analysis, regression analysis were performed. The results, based on them, are as follows: First, Among the motivations for participating in the elderly sports activities, internal motivation influenced psychological satisfaction, educational satisfaction, psychological satisfaction. Second. external motive influenced social satisfaction, resting satisfaction. Third. amotivation influenced psychological satisfaction, educational satisfaction, resting satisfaction, environmental satisfaction.