• Title/Summary/Keyword: 보안장치

Search Result 805, Processing Time 0.033 seconds

Performance Analysis of Implementation on IoT based Smart Wearable Mine Detection Device

  • Kim, Chi-Wook
    • Journal of the Korea Society of Computer and Information
    • /
    • v.24 no.12
    • /
    • pp.51-57
    • /
    • 2019
  • In this paper, we analyzed the performance of IoT based smart wearable mine detection device. There are various mine detection methods currently used by the military. Still, in the general field, mine detection is performed by visual detection, probe detection, detector detection, and other detection methods. The detection method by the detector is using a GPR sensor on the detector, which is possible to detect metals, but it is difficult to identify non-metals. It is hard to distinguish whether the area where the detection was performed or not. Also, there is a problem that a lot of human resources and time are wasted, and if the user does not move the sensor at a constant speed or moves too fast, it is difficult to detect landmines accurately. Therefore, we studied the smart wearable mine detection device composed of human body antenna, main microprocessor, smart glasses, body-mounted LCD monitor, wireless data transmission, belt type power supply, black box camera, which is to improve the problem of the error of mine detection using unidirectional ultrasonic sensing signal. Based on the results of this study, we will conduct an experiment to confirm the possibility of detecting underground mines based on the Internet of Things (IoT). This paper consists of an introduction, experimental environment composition, simulation analysis, and conclusion. Introduction introduces the research contents such as mines, mine detectors, and research progress. It consists of large anti-personnel mine, M16A1 fragmented anti-mine, M15 and M19 antitank mines, plastic bottles similar to mines and aluminum cans. Simulation analysis is conducted by using MATLAB to analyze the mine detection device implementation performance, generating and transmitting IoT signals, and analyzing each received signal to verify the detection performance of landmines. Then we will measure the performance through the simulation of IoT-based mine detection algorithm so that we will prove the possibility of IoT-based detection landmine.

Adaptive Data Hiding Techniques for Secure Communication of Images (영상 보안통신을 위한 적응적인 데이터 은닉 기술)

  • 서영호;김수민;김동욱
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.29 no.5C
    • /
    • pp.664-672
    • /
    • 2004
  • Widespread popularity of wireless data communication devices, coupled with the availability of higher bandwidths, has led to an increased user demand for content-rich media such as images and videos. Since such content often tends to be private, sensitive, or paid for, there exists a requirement for securing such communication. However, solutions that rely only on traditional compute-intensive security mechanisms are unsuitable for resource-constrained wireless and embedded devices. In this paper, we propose a selective partial image encryption scheme for image data hiding , which enables highly efficient secure communication of image data to and from resource constrained wireless devices. The encryption scheme is invoked during the image compression process, with the encryption being performed between the quantizer and the entropy coder stages. Three data selection schemes are proposed: subband selection, data bit selection and random selection. We show that these schemes make secure communication of images feasible for constrained embed-ded devices. In addition we demonstrate how these schemes can be dynamically configured to trade-off the amount of ded devices. In addition we demonstrate how these schemes can be dynamically configured to trade-off the amount of data hiding achieved with the computation requirements imposed on the wireless devices. Experiments conducted on over 500 test images reveal that, by using our techniques, the fraction of data to be encrypted with our scheme varies between 0.0244% and 0.39% of the original image size. The peak signal to noise ratios (PSNR) of the encrypted image were observed to vary between about 9.5㏈ to 7.5㏈. In addition, visual test indicate that our schemes are capable of providing a high degree of data hiding with much lower computational costs.

Android Based Mobile Combination Login Application (안드로이드 기반 모바일 통합로그인 애플리케이션)

  • Lim, Jung-Gun;Choi, Chang-Suk;Park, Tae-Eun;Ki, Hyo-Sun;An, Beongku
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.13 no.3
    • /
    • pp.151-156
    • /
    • 2013
  • Android that was made by Google and Open Handset Alliance is the open source software toolkit for mobile phone. In a few years, Android will be used by millions of Android mobile phones and other mobile devices, and become the main platform for application developers. In this paper, the integrated login application based on Google's Android platform is developed. The main features of the mobile combination login application content based on Android are as follows. First, the application has more convenient login functionality than the functionality of general web browser as the web browser of the mobile-based applications(web browser style applications) as well as security features and faster screen(view) capability by reducing the amount of data transfer. Second, the application is so useful for management of ID and Password, and it can easily manage multiple ID information such as message, mail, profile. The results of performance evaluation of the developed application show the functionality that can login many kinds of portal sites simultaneously as well as the ability that can maintain login continuously. Currently, we are trying to develope a couple of the technologies that can insert multiple accounts into one ID and check all information on one screen.

QR-Code Based Mutual Authentication System for Web Service (웹 서비스를 위한 QR 코드 기반 상호 인증 시스템)

  • Park, Ji-Ye;Kim, Jung-In;Shin, Min-Su;Kang, Namhi
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.39B no.4
    • /
    • pp.207-215
    • /
    • 2014
  • Password based authentication systems are most widely used for user convenience in web services. However such authentication systems are known to be vulnerable to various attacks such as password guessing attack, dictionary attack and key logging attack. Besides, many of the web systems just provide user authentication in a one-way fashion such that web clients cannot verify the authenticity of the web server to which they set access and give passwords. Therefore, it is too difficult to protect against DNS spoofing, phishing and pharming attacks. To cope with the security threats, web system adopts several enhanced schemes utilizing one time password (OTP) or long and strong passwords including special characters. However there are still practical issues. Users are required to buy OTP devices and strong passwords are less convenient to use. Above all, one-way authentication schemes generate several vulnerabilities. To solve the problems, we propose a multi-channel, multi-factor authentication scheme by utilizing QR-Code. The proposed scheme supports both user and server authentications mutually, thereby protecting against attacks such as phishing and pharming attacks. Also, the proposed scheme makes use of a portable smart device as a OTP generator so that the system is convenient and secure against traditional password attacks.

Elliptic Curve Cryptography Coprocessors Using Variable Length Finite Field Arithmetic Unit (크기 가변 유한체 연산기를 이용한 타원곡선 암호 프로세서)

  • Lee Dong-Ho
    • Journal of the Institute of Electronics Engineers of Korea SD
    • /
    • v.42 no.1
    • /
    • pp.57-67
    • /
    • 2005
  • Fast scalar multiplication of points on elliptic curve is important for elliptic curve cryptography applications. In order to vary field sizes depending on security situations, the cryptography coprocessors should support variable length finite field arithmetic units. To determine the effective variable length finite field arithmetic architecture, two well-known curve scalar multiplication algorithms were implemented on FPGA. The affine coordinates algorithm must use a hardware division unit, but the projective coordinates algorithm only uses a fast multiplication unit. The former algorithm needs the division hardware. The latter only requires a multiplication hardware, but it need more space to store intermediate results. To make the division unit versatile, we need to add a feedback signal line at every bit position. We proposed a method to mitigate this problem. For multiplication in projective coordinates implementation, we use a widely used digit serial multiplication hardware, which is simpler to be made versatile. We experimented with our implemented ECC coprocessors using variable length finite field arithmetic unit which has the maximum field size 256. On the clock speed 40 MHz, the scalar multiplication time is 6.0 msec for affine implementation while it is 1.15 msec for projective implementation. As a result of the study, we found that the projective coordinates algorithm which does not use the division hardware was faster than the affine coordinate algorithm. In addition, the memory implementation effectiveness relative to logic implementation will have a large influence on the implementation space requirements of the two algorithms.

Improving the Efficiency of National Defense Transportation Information System by using ITS (ITS를 활용한 국방수송정보체계 효율성 증진에 관한 연구)

  • O, Byeong-Eun;Kim, Hyeong-Jin;Son, Bong-Su
    • Journal of Korean Society of Transportation
    • /
    • v.24 no.1 s.87
    • /
    • pp.85-94
    • /
    • 2006
  • Currently, when the military performs military operations in wartime and peace time, it is important for him to obtain repeatedly updated traffic information for security of the military supply support. The purpose of this study is to present an acquisition way of the repeatedly updated traffic information which the military is available. To achieve this Purpose, firstly, this paper finded types of traffic information which the military demanded and limitations caused by an connection of traffic information network between the military and associated government agencies. Also. grasped ITS(Intelligent Transportation systems) equipment operation by associated government agencies (Ministry Construction & Transportation, Korea Highway Corporation, Seoul Metropolitan Government, National Police Agency, Korea Institute of Construction Technology) and connection situations of traffic information network among associated government agencies. On the basis of these materials, this study presented the most efficient connection method in the field of the space and the contents of traffic information between the military and associated government agencies and ITS connection system between the military and associated government agencies was contrived. Throughout the upper processes, this paper showed a method which is available for acquiring ITS traffic information of associated government agencies. In addition to the connection method of ITS traffic information network, resolutions for the problems caused by connection of ITS network were come up with. But the more deep study for this matter is needed since resolutions for the problems of the ITS network connection, which this paper presented, were very restricted.

A Comparative Assessment Between LVTS of Canada and Fedwire of America as a Wholesale Electronic Payment System (미국과 캐나다의 거액전자지급결제제도 비교연구 - 미국의 Fedwire와 캐나다의 LVTS를 중심으로 -)

  • Lee, Byeong-Ryul
    • International Commerce and Information Review
    • /
    • v.19 no.1
    • /
    • pp.43-63
    • /
    • 2017
  • I focused on LVTS compare with Fedwire to advance a research effects in this paper. The Fedwire Funds Service is generally used to make large-value, time-critical payments. The Federal Reserve Banks provide the Fedwire Funds Service, a real-time gross settlement system that enables participants to initiate funds transfer that are immediate, final, and irrevocable once processed. The Fedwire Funds Service is a credit transfer service. While, The LVTS(Large Value Transfer System) is the high value electronic wire system that facilitates the transfer of irrevocable payments in canadian dollars across the country. Through LVTS, funds can be transferred between participating financial institutions virtually instantaneously in a fully collateralized environment. Thus in this article, first of all, I considered features of payment system between LVTS and Fedwire. Second, I analyzed the governing structure and legal background. Third, I focused on the operational policy and risk aversion policy. Lastly, I suggested that the payment and banking system have to assume, with good reason, more efficiently accurately and securely operation together with conclusion.

  • PDF

Investigation of Fracture Propagation in Cement by Hydraulic Fracturing Under the Tri-axial Stress Condition (시멘트 시료에 대한 삼축압축 환경에서의 수압파쇄시험 연구)

  • Riu, Hee-Sung;Jang, Hyun-Sic;Jang, Bo-An
    • The Journal of Engineering Geology
    • /
    • v.27 no.3
    • /
    • pp.233-244
    • /
    • 2017
  • We conducted hydraulic fracturing experiments on cement samples to investigate the dependency of fracture propagation on the viscosity of injection fluid and the in situ stress state. Ten cubic samples (20 cm side length) were produced using cement that was cured in water for more than one month. Samples were placed in a tri-axial compression apparatus with three independent principal stresses. An injection hole was drilled and the sample was hydraulically fractured under a constant injection rate. We measured injection pressures and acoustic emissions (AE) during the experiments, and investigated the fracture patterns produced by hydraulic fracturing. Breakdown pressures increased exponentially with increasing viscosity of the injection fluid. Fracture patterns were dependent on differential stress (i.e., the difference between the major and minor principal stresses). At low differential stress, multiple fractures oriented sub-parallel to the major principal stress axis propagated from the injection hole, and in some samples the fracture orientation changed during propagation. However, at high differential stress, a single fracture propagated parallel to the major principal stress axis. AE results show similar patterns. At low differential stress, AE source locations were more widespread than at high differential stress, consistent with the fracture pattern results. Our study suggests that hydraulic fracturing during shale gas extraction should be performed parallel to the orientation of minimum differential stress.

Mobile phone payment system using a light signal (휴대폰의 광원을 이용한 디지털 카드 시스템)

  • Hu, Moon-Heang;Shin, Moon-Sun;Ryu, Kuen-Ho
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.10 no.6
    • /
    • pp.1237-1244
    • /
    • 2009
  • In this paper, we proposed a mobile phone payment system using light signal containing payment related information. The digicard system we proposed creates virtual mobile card such as credit numbers and the created information is loaded in mobile phone. The virtual card information should be changed to pulse signal by light signal devices of mobile phone and the specific digicard system reader is able to read light signal. In recent years, a mobile phone payment system has been developed in order to provide user's convenience. But the mobile phone payment system has problems such as the production costs and complex and large size. In order to solve the aforementioned problems, we proposed mobile phone payment system being implemented by updating software without additional hardware modules. Therefore it is possible to apply the proposed digicard system to all kinds of mobile phone. Also encryption module is implemented to solve the problem of the security and privacy. According to an aspect of the present invention, there is provided a mobile phone payment system using a light signal containing payment-related information, comprising: a mobile phone; a photo receiver: and a control server.

Verification and Implementation of a Service Bundle Authentication Mechanism in the OSGi Service Platform Environment (OSGi 서비스 플랫폼 환경에서 서비스 번들 인증 메커니즘의 검증 및 구현)

  • 김영갑;문창주;박대하;백두권
    • Journal of KIISE:Computer Systems and Theory
    • /
    • v.31 no.1_2
    • /
    • pp.27-40
    • /
    • 2004
  • The OSGi service platform has several characteristics as in the followings. First, the service is deployed in the form of self-installable component called service bundle. Second, the service is dynamic according to its life-cycle and has interactions with other services. Third, the system resources of a home gateway are restricted. Due to these characteristics of a home gateway, there are a lot of rooms for malicious services can be Installed, and further, the nature of service can be changed. It is possible for those service bundles to influence badly on service gateways and users. However, there is no service bundle authentication mechanism considering those characteristics for the home gateway In this paper, we propose a service bundle authentication mechanism considering those characteristics for the home gateway environment. We design the mechanism for sharing a key which transports a service bundle safely in bootstrapping step that recognize and initialize equipments. And we propose the service bundle authentication mechanism based on MAC that use a shared secret created in bootstrapping step. Also we verify the safety of key sharing mechanism and service bundle authentication mechanism using a BAN Logic. This service bundle authentication mechanism Is more efficient than PKI-based service bundle authentication mechanism or RSH protocol in the service platform which has restricted resources such as storage spaces and operations.