• Title/Summary/Keyword: 보안장치

Search Result 805, Processing Time 0.028 seconds

Improved Single Packet Authentication and Network Access Control Security Management in Software Defined Perimeter (소프트웨어 정의 경계의 단일 패킷 인증 및 네트워크 접근통제 보안관리 개선)

  • Jung, Jin-kyo;Lee, Sang-ku;Kim, Young-Min
    • The Journal of the Korea Contents Association
    • /
    • v.19 no.12
    • /
    • pp.407-415
    • /
    • 2019
  • As the IT environment changes with cloud computing and smart work, the existing perimeter security model is showing its limitations and Software Defined Perimeter is being discussed as an alternative. However, SDP Spec 1.0 does not specify the device registration procedure, policy distribution process and authentication key generation and sharing process.In this paper, we propose a method to solve the problem of SDP access control by improving the operation procedure of Single Packet Authentication. This paper suggests that the proposed method can implement a consistent and automated integrated access control policy compared to the existing access control methods.

Improve utilization of Drone for Private Security (Drone의 민간 시큐리티 활용성 제고)

  • Gong, Bae Wan
    • Convergence Security Journal
    • /
    • v.16 no.3_2
    • /
    • pp.25-32
    • /
    • 2016
  • Drone refers to an unmanned flying system according to the remote control. That is a remote control systems on the ground or a system that automatically or semi auto-piloted system without pilot on board. Drones have been used and developed before for military purposes. However there are currently utilized in a variety of areas such as logistics and distribution of relief supplies disaster areas, wireless Internet connection, TV, video shooting and disaster observation, tracking criminals etc. Especially it can be actively used in activities such as search or the structure of the disaster site, and may be able to detect the movement of people and an attacker using an infrared camera at night. Drones are very effective for private security.

MACsec Adapter for 2 Layer Security (2계층 보안을 위한 MACsec 어댑터)

  • Jeong, Nahk-Ju;Seo, Jong-Kyoun;Han, Ki-Cheon;Kim, Chang-Su;Jung, Hoe-Kyung
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2016.05a
    • /
    • pp.654-656
    • /
    • 2016
  • MACsec is a cryptographic function that operates on Layer 2. As industries such as IoT(Internet of Things) devices are receiving attention recently are connected to the network and Internet traffic is increasing rapidly. Because of today, Becoming the increase in traffic and complex situations to protect the overall traffic, not just certain parts. The MACsec technology has received attention. In this paper, Layer 2 security technology to MACsec. Design the technology MACsec adapter that can easily and readily added to existing Layer 2 network.

  • PDF

Registration of the 3D Range Data Using the Curvature Value (곡률 정보를 이용한 3차원 거리 데이터 정합)

  • Kim, Sang-Hoon;Kim, Tae-Eun
    • Convergence Security Journal
    • /
    • v.8 no.4
    • /
    • pp.161-166
    • /
    • 2008
  • This paper proposes a new approach to align 3D data sets by using curvatures of feature surface. We use the Gaussian curvatures and the covariance matrix which imply the physical characteristics of the model to achieve registration of unaligned 3D data sets. First, the physical characteristics of local area are obtained by the Gaussian curvature. And the camera position of 3D range finder system is calculated from by using the projection matrix between 3D data set and 2D image. Then, the physical characteristics of whole area are obtained by the covariance matrix of the model. The corresponding points can be found in the overlapping region with the cross-projection method and it concentrates by removed points of self-occlusion. By the repeatedly the process discussed above, we finally find corrected points of overlapping region and get the optimized registration result.

  • PDF

A Lock System Design Using LCD Barcode of Cellular Phone (휴대폰의 액정 바코드를 이용한 Lock시스템 설계)

  • 곽현민;저광일;조해성;채균식;이상태
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.41 no.9
    • /
    • pp.1-7
    • /
    • 2004
  • This thesis shows embodiment of lock system design for combination of usefulness, convenient of Barcode and cellular phone. This thesis consists of Lock system design using cellular phone and product introduction, including details from formation of barcode scanner to scanner design. When this research is applied to security system a general idea of physical key disappears and it is Possible that cellular phone becomes the center of security and we can expect that cellular phone use for payment will increase due to mutual direction service. After, we should study its application to various practical field and develop high sensitive equipment.

Method for Power control of Wired and Wireless linkage Sensor Network for Low-power Wireless network (저전력 무선 네트워크를 위한 유무선 연동 센서 네트워크의 전력 제어 방법)

  • Lee, Kyung-Sook;Kim, Hyun-Deok
    • Convergence Security Journal
    • /
    • v.12 no.3
    • /
    • pp.27-34
    • /
    • 2012
  • In this paper, using a new low-power consumption method for ZigBee device, which consume low-power using an output power control algorithm through RSSI monitoring as interlocking wireless network using ZigBee which has advantages of a low-power consumption, a low-cost, a compatibility and a draft international standardization enacted by IEEE and ZigBee Alliance, with wired network using built coaxial cable to overcome the disadvantage of the existing wireless sensor network, is proposed. Effectiveness of the output power control algorithm through RSSI monitoring has been verified by experimentation for more optimized low-power consumption.

The Design and Implementation of School-Zone Safety Management System Based onContext-Aware (상황인식 기반의 스쿨존 안전 관리 시스템 설계 및 구현)

  • Lee, Jin-Kwan;Lee, Chang-Bok;Park, Sang-Jun;Lee, Jong-Chan;Park, Ki-Hong
    • Convergence Security Journal
    • /
    • v.9 no.1
    • /
    • pp.11-17
    • /
    • 2009
  • The object of this paper is to design a school-zone safety management system based on context-aware, integrated with computing technology. When it occurs to kidnap of elementary school students, the monitoring device creates context information through a combination object extraction and context-aware technology and alarm administrator about an emergency situation. In addition, the proposed system that requires a human perspective, a railroad crossing, statistics research of traffic, and a variety of applications such as factory automation systems can be used to be the best choice.

  • PDF

Low Power Diaper Urination Alarm Technology with Bluetooth v4.0 (블루투스 v4.0을 활용한 저(低)전력형 기저귀 배뇨 발생 알람 기술)

  • Paik, Jung Hoon
    • Convergence Security Journal
    • /
    • v.13 no.4
    • /
    • pp.27-32
    • /
    • 2013
  • In this paper, technologies applied to design urination detection device on diaper that issues an alarm signal to guardian within 10~20m are introduced. It features power saving that uses both low power bluetooth v4.0 chip and low-power program scheme that makes sensor and mirco-controller to be sleep mode while data is not receiving from sensor. Urination detection algorithm that utilizes the difference between previous sensing data and current values is used to improve the degree of the detection precision level. The device designed with the suggested technologies shows the performance that is 100ml of the minimum urine amount for detection, more than 90% of urination detection degree, and 100% of wireless communication success rate.

NSG : A Security Enhancement of the E0 Cipher Using Nonlinear Algorithm in Bluetooth System (NSG : 비선형 알고리즘을 이용한 블루투스 E0 암호화시스템의 성능 개선)

  • Kim, Hyeong-Rag;Lee, Hun-Jae;Moon, Sang-Jae
    • The KIPS Transactions:PartC
    • /
    • v.16C no.3
    • /
    • pp.357-362
    • /
    • 2009
  • Summation generator can be easily made as a simple hardware or software and it's period and linear complexity are very high. So it is appropriate to mobile security system for ubiquitous environment. But it showed us the weakness by Golic's correlation attack and Meier's fast correlation attack. In this paper, we proposed a Nonlinear Summation Generator(NSG), which is improved by using LFSR and NFSR(nonlinear feedback shift register), is different from $E_0$ algorithm which use only LFSR in summation generator. It enhanced nonlinearity and is hard to decipher even though the correlation attack or fast correlation attack. We also analyzed the security aspects and the performances for the proposed algorithm.

Study on Security Weakness of Barcode Devices (바코드를 이용하는 기기에서의 보안적 취약점 탐구)

  • Park, Beom-joon
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2017.10a
    • /
    • pp.457-461
    • /
    • 2017
  • Barcode is widely being used in many places such as supermarket, cafeteria, library, etc. ISBN, Code 128, Code 39 are mainly used in barcode. Among them, Code 128 which is based on ASCII Code can transfer control letters that range from ASCII Code 0 to ASCII 32. Control letters intrinsically imply letters that are used to deliver information to peripheral devices such as a printer or communication joint, however, they play quite different roles if they are inputted on Windows. Generally, barcode devices doesn't verify input data, thus it enables people to tag any barcode that has specific control letters and execute the commands. Besides, most barcode recognition programs are using a database and they have more security weakness compared to other programs. On the basis of those reasons, I give an opinion that SQL Injection can attack barcode recognition programs through this study.

  • PDF