• Title/Summary/Keyword: 안전 동기

Search Result 353, Processing Time 0.025 seconds

Privacy Vulnerability Analysis on Shuai et al.'s Anonymous Authentication Scheme for Smart Home Environment (Shuai등의 스마트 홈 환경을 위한 익명성 인증 기법에 대한 프라이버시 취약점 분석)

  • Choi, Hae-Won;Kim, Sangjin;Jung, Young-Seok;Ryoo, Myungchun
    • Journal of Digital Convergence
    • /
    • v.18 no.9
    • /
    • pp.57-62
    • /
    • 2020
  • Smart home based on Internet of things (IoT) is rapidly emerging as an exciting research and industry field. However, security and privacy have been critical issues due to the open feature of wireless communication channel. As a step towards this direction, Shuai et al. proposed an anonymous authentication scheme for smart home environment using Elliptic curve cryptosystem. They provided formal proof and heuristic analysis and argued that their scheme is secure against various attacks including de-synchronization attack, mobile device loss attack and so on, and provides user anonymity and untraceability. However, this paper shows that Shuai et al.'s scheme does not provide user anonymity nor untraceability, which are very important features for the contemporary IoT network environment.

A Study on Estimation of Overpressure Damage Caused by Rupture of Butane Can (volume : 34 g) (부탄 캔(용량 : 34 g)파열로 인한 과압의 피해예측에 관한 연구)

  • Leem Sa Hwan;Choi Ic Whoan;Lim Dong Yeon
    • Journal of the Korean Institute of Gas
    • /
    • v.9 no.2 s.27
    • /
    • pp.8-15
    • /
    • 2005
  • With the introduction of 40 hour working week system, more households enjoy picnics on weekends. More gas accidents take place on Saturdays and on Sundays than any other days of week. As of October, 2004 casualties resulted from butane can accidents increased 1.5 times compared to the same period of the previous year. In this study, the influence of explosion over-pressure caused by the rupture of butane can thrown away after use was calculated by using the Hopkinson's Scaling Law and the accident damage was estimated by applying the influence on the adjacent structures and people into the Probit model. As a result of the damage estimation conducted by using the Probit model, both the damage possibility of explosion over-pressure to structures 50 meters away and that of over-pressure to people 10 meters away showed nothing. The explosion efficiency used was 100 percent. As a result of this, the actual damage influenced by the rupture of butane can would be lower than the value calculated in this study and expected to be safer.

  • PDF

Fair EPC System (사용자 프라이버시 보호 및 추적이 가능한 EPC 시스템)

  • Kwak Jin;Oh Soohyun;Rhee Keunwoo;Kim Seungjoo;Won Dongho
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.30 no.1C
    • /
    • pp.116-128
    • /
    • 2005
  • The low-cost REID system is expected to be widely used in the ubiquitous computing environment as an intelligent device. Although REID systems have several advantages, they may create new threats to users' privacy. In this paper, a traceable and unlinkable REID system called 'Fair EPC system' is proposed for low-cost RFID tags. The proposed system enables the protection of users' privacy from unwanted scanning, and it is traceable to the tag by authorized administrators when necessary. The proposed system has some advantages; (1) eliminating any danger of exposing users' information via tag tracking through the cooperation between readers or back-end databases, (2) enabling the tracking of real serial number of the tag only through the cooperation of authorized administrators using a cryptographic secret sharing scheme, and (3) providing the efficiency of the proposed system reduce the computational workloads of back-end databases.

Customer Willingness to Use Smart Grid Services in Home (스마트 그리드 서비스에 대한 고객 수용도 분석)

  • Kim, Young-Myoung;Lee, Young-Woo
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.35 no.9B
    • /
    • pp.1399-1406
    • /
    • 2010
  • Customers can monitor electricity use in real time in smart grid(ICT is grafted onto current grid), so various beneficial services can be provided to customer. We did a qualitative survey, HV(Home Visit) and FGD(Focus Group Discussion), in order to derive customer's cognition of using electricity in home and values that customers consider significantly and a quantitative survey in order to know willingness to use. Customers consider electricity indispensible for using home appliances, want to use safely far from electromagnetic waves, short circuit and electronic shock. Also, customers want to save energy conveniently with no stress. Customers want 'a function', 'information', 'motivation' for energy saving, and 'electromagnetic waves cutting', 'to prevent electronic shock', 'to prevent short circuit' for safe electricity use. In this study, we derived 4 services - energy monitoring, standby power cutting, remote control, energy consulting - based on customer values and unmet needs, which is connected to home network that customers can monitor total and each appliance's electricity usage in real time and control home appliances. The willingness to use of services is over 60% and especially energy monitoring and standby power cutting service have high willingness to use rate, about 80%.

A Study on the Implementation of Wireless Snesor Network for Managing of Briges (교량 유지관리를 위한 무선 센서 네트워크 시스템 연구)

  • Kim, Young-Baig
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.6 no.5
    • /
    • pp.783-788
    • /
    • 2011
  • Most management systems that are currently in place to monitor the safety of bridges - working in conjunction with a wireless sensor network - are based on a wired infrastructure. Not only do these wired systems expensive to install, but they are expensive to replace or repair should a problem occur with the system while in operation. In an effort to address these problems, there have been many researches that attempted to use a wireless sensor network for the existing wired measurement system. However, they have been met with difficulty due to the problems of power and synchronization in actually bringing the management system to the bridges as a commercial system. This paper proposes a bridge management system based on WSN (Wireless Sensor Network) which uses wireless LAN technology. The system was tested using a testbed and when the obtained data were compared to the data collected using the existing wired counterpart it was found that they were almost the same.

Numerical Analysis on the Startup of a Rocket Engine (로켓 엔진의 시동에 관한 해석적 연구)

  • Park, Soon-Young;Seol, Woo-Seok
    • Journal of the Korean Society of Propulsion Engineers
    • /
    • v.11 no.5
    • /
    • pp.60-71
    • /
    • 2007
  • The startup characteristic of liquid propellant rocket engine should be focused on the stable ignition of combustion chamber and gas generator. Also, to lessen the propellants consumption during this period which doesn't contribute to the flight thrust, the engine has to be transferred to the nominal mode quickly. Because of the risk of test, it is impossible to develop all the startup cyclogram or the specifications of engine by test, so the precedent numerical approach is quite necessary. In this study we developed a mathematical model for the startup phenomena in a liquid rocket engine driven by gas generator-turbopump system based on the commercial 1-D flow system analysis program, Flowmaster. Using this program we proposed a methodology to obtain the specifications of turbine starter and the opening time of shutoff valves for the stable startup of the engine. To verify this methodology we qualitatively compared the analysis results to the typical startup curve of the published engine, then found it is quite well matched.

Privacy Protection Scheme of Healthcare Patients using Hierarchical Multiple Property (계층적 다중 속성을 이용한 헬스케어 환자의 프라이버시 보호 기법)

  • Shin, Seung-Soo
    • Journal of Digital Convergence
    • /
    • v.13 no.1
    • /
    • pp.275-281
    • /
    • 2015
  • The recent health care is growing rapidly want to receive offers users a variety of medical services, can be exploited easily exposed to a third party information on the role of the patient's hospital staff (doctors, nurses, pharmacists, etc.) depending on the patient clearly may have to be classified. In this paper, in order to ensure safe use by third parties in the health care environment, classify the attributes of patient information and patient privacy protection technique using hierarchical multi-property rights proposed to classify information according to the role of patient hospital officials The. Hospital patients and to prevent the proposed method is represented by a mathematical model, the information (the data consumer, time, sensor, an object, duty, and the delegation circumstances, and so on) the privacy attribute of a patient from being exploited illegally patient information from a third party the prevention of the leakage of the privacy information of the patient in synchronization with the attribute information between the parties.

Efficient RFID Search Protocols Providing Enhanced User Privacy (강화된 사용자 프라이버시를 보장하는 효율적인 RFID 검색 프로토콜)

  • Lim, Ji-Hwan;Oh, Hee-Kuck;Nyang, Dae-Hun;Lee, Mun-Kyu;Kim, Sang-Jin
    • The KIPS Transactions:PartC
    • /
    • v.16C no.3
    • /
    • pp.347-356
    • /
    • 2009
  • In an RFID search protocol, a reader uses designated query to determine whether a specific tag is in the vicinity of the reader. This fundamental difference makes search protocol more vulnerable to replay attacks than authentication protocols. Due to this, techniques used in existing RFID authentication protocols may not be suitable for RFID search protocols. In this paper, we propose two RFID search protocols, one based on static ID and the other based on dynamic ID, which use counter to prevent replay attacks. Moreover, we propose a security model for RFID search protocols that includes forward/backward traceability, de-synchronization and forgery attack. Based on this model, we analyze security of our protocols and related works.

A Study of design Asyn communication eletronic cash protocol and system using PSTN/leased line (PSTN/전용선을 이용한 비동기 통신방식의 전자지불 프로토콜과 시스템 설계연구)

  • Kim, Whi-Young
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2002.04b
    • /
    • pp.1563-1566
    • /
    • 2002
  • The increase of vehicles stagnations leads to the increasing attention to the way customers pay and a large number of projects on electronic cash system. Tranport system is comprised of a number of advanced technologies, including information processing, communications, control, and electronics. Recently many research on a system which provides contact in order to protect driver is vehicle passage have been carried out. And some potential problems from that system are being reviewed by electronic cash system. In this papers, we suggest RF protocol developing technology using the concept of electronic cash. ATM electronic cash developing is consist of component of pre-developed coin throw, integration of component using its, and production of more requirement-satisfactory ITS solution. Result increase $15{\sim}40%$ pre-type vehicles stagnations. Especially, we expect this proposed concept would be well adapted to our national environments.

  • PDF

A Study on the Development of Crime Prediction Program(CPP) (범죄발생 예측프로그램 설계에 관한 연구)

  • Kim Young-Hwan;Mun Jeong-Min
    • Journal of the Korea Society of Computer and Information
    • /
    • v.11 no.4 s.42
    • /
    • pp.221-230
    • /
    • 2006
  • Changing drastically, the life in a modern city has forced citizens to gradually shorten their average period of settlement, which has weakened the identity of city habitation, thus causing serious crimes and damaging the security of city greatly. Haying a highly composite structure with not only macro, but micro characteristics, city is grasped as a very composite phenomenon shown in the social, economic and spatial constitution relationships, including the personal motives of criminals. Accordingly, this study puts stress on the necessity of any crime prediction program to predict the occurrence of crimes by analyzing the occurrence patterns of sharply increasing intra-city crimes of violence on a typical, time and spatial basis and clarifying their structural dynamic relationships in a both macro and micro manner. Moreover, the deduction of various factors closely related to crime occurrence will contribute to elucidating the occurrence structure of city crimes.

  • PDF