• Title/Summary/Keyword: 유비쿼터스 보안

Search Result 479, Processing Time 0.024 seconds

Exhibition Monitoring System using USN/RFID based on ECA (USN/RFID를 이용한 ECA기반 전시물 정보 모니터링 시스템)

  • Kim, Gang-Seok;Song, Wang-Cheol
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.9 no.6
    • /
    • pp.95-100
    • /
    • 2009
  • Nowadays there are many studies and there's huge development about USN/RFID which have great developmental potential to many kinds of applications. More and more real time application apply USN/RFID technology to identify data collect and locate objects. Wide deployment of USN/RFID will generate an unprecedented volume of primitive data in a short time. Duplication and redundancy of primitive data will affect real time performance of application. Thus, security applications must filter primitive data and correlate them for complex pattern detection and transform them to events that provide meaningful, actionable information to end application. In this paper, we design a ECA Rule system for security monitoring of exhibition. This system will process USN/RFID primitive data and event and perform data transformation. It's had applied each now in exhibition hall through this study and efficient data transmission and management forecast that is possible.

  • PDF

An Empirical Study on Practical Use of U-Services through RFID in University (대학에서 RFID를 통한 u-서비스의 활용에 관한 실증연구)

  • Lee, Sang-Shik;Bae, Sun-Mi
    • Journal of Korea Society of Industrial Information Systems
    • /
    • v.11 no.5
    • /
    • pp.207-215
    • /
    • 2006
  • In this paper, we attempt to investigate the factors influencing usage and acceptance of ubiquitous services in campus, based on the Technology Acceptance Model(TAM). This study conceptualizes and develops three dimensions of u-Services, such as real time service, information security, customization service, and tests the relationship among u-Services, perceived usefulness and perceived ease of use, and intention to use. Data were collected from 162 respondents in K-University and research model was tested using multiple regression analysis. As a consequence, this study found that customization service is an important factor which is influenced to perceived usefulness and perceived ease of use.

  • PDF

Development Strategies for Business GIS Based on NGIS (NGIS 기반하의 Business GIS 발전방안)

  • Lee, Bong-Gyou;Song, Ji-Young
    • Journal of Korea Spatial Information System Society
    • /
    • v.7 no.2 s.14
    • /
    • pp.3-14
    • /
    • 2005
  • The purpose of this study is to present the role of NGIS(National Geographic Information System) and the development strategy for Business GIS in the ubiquitous society. We analyze the level of GIS technology with the ICT(Information Communication Technology) as well as GIS application trends especially in location-based circumstances. Also, we advocate not only making GIS contents to meet the international standards such as GML(Geography Markup Language) and TPEG(Transport Protocol Experts Group) but applying GIS as a killer application to oncoming diverse ICT areas including LBS(Location -Based Service), Telematics, ITS(Intelligent Transport System), gCRM(geographic Customer Relationship Management), DMB(Digital Multimedia Broadcasting), u(ubiquitous)-City and u-Town. Finally, we build a conceptual Business GIS model based on NGIS for QoS, standardization, R&D, education, and security.

  • PDF

A Study on the Efficient RFID Tag Identification considering Performance Information of Individual Nodes in a Grid Environment (그리드 환경에서 노드별 성능정보를 고려한 효율적인 RFID 태그 판별에 관한 연구)

  • Shin, Myeong-Sook;Lee, Joon
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.6 no.5
    • /
    • pp.797-802
    • /
    • 2011
  • RFID is recognized to technically occupy important position in ubiquitous computing environment and expected to create new markets in a variety of fields from now on. In order to generalize RFID system, it is required to solve the problem of privacy invasion and expedite lots of tags We suggest efficient RFID Tag Identification to identify tags quickly on the satisfaction with 3 security requirements of privacy protection in this paper. This methods are transferred to Grid environment through parallel analysis of Hash-Chain, and we measure performance of each nodes under the Grid environment. Then, We'll suggest SP-Division Algorithm to identify tags with each nodes and implement it in a Grid environment.

Experiment and Analysis of Session-key Authentication Mechanism based on MANET (MANET 기반 세션키 인증기법의 실험 및 분석)

  • Lee, Cheol-Seung;Jung, Sung-Ok
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.10 no.12
    • /
    • pp.1355-1360
    • /
    • 2015
  • Recently MANET application is diversified studies on the MANET routing security and the reliable authentication mechanism is actively in progress. Stand-alone network structure of a MANET is an important field of ubiquitous computing environment of interest, Authentication techniques are already provided safety when applied to MANET reliability and efficiency in a secure authentication mechanism using the session key. However, most of the MANET environment, the model has been based on the assumption that the safety is guaranteed, When applied to an actual network situation, we can not rule out a variety of threats. This study is the testing and analysis to add the malicious node extracted at random to demonstrate the safety and efficacy of the session key certification techniques of the MANET environment.

Risks and Safeguards of the Spywares (스파이웨어의 위험관리에 대한 연구)

  • Kim, Sang-Kyun
    • Journal of the Korea Society of Computer and Information
    • /
    • v.10 no.4 s.36
    • /
    • pp.305-313
    • /
    • 2005
  • Spyware is any software which employs a user's Internet connection in the background without their knowledge or explicit permission. The installation of spywares is generally done in a sneaky, misleading or unannounced manner. It does not only compromise the security and privacy of affected users but also be an obstruction to the digital convergence and ubiquitous computing environments. This paper provides a summary of the definition, status, risk analysis, and security controls of the spywares. Furthermore, this paper suggests additional controls which should be considered at an individual, organizational and national perspective.

  • PDF

Improved RFID Authentication Protocol Based on SSG (SSG기반 개선된 RFID 인증 프로토콜)

  • Park, Taek-Jin
    • The Journal of Korea Institute of Information, Electronics, and Communication Technology
    • /
    • v.4 no.4
    • /
    • pp.311-317
    • /
    • 2011
  • Recently, RFID is substituted for bar codes according to advance in the ubiquitous computing environments, but the RFID system has several problems such as security and privacy because it uses radio frequencies. Firstly, unauthorized reader can easily read the ID information of any Tag. Secondly, Attacker can easily fake the legitimate reader using the collected Tag ID information,such as the any legitimate tag. This paper proposed improved RFID authentication protocol based on SSG. SSG is organized only one LFSR and selection logic. Thus SSG is suitable for implementation of hardware logic in system with extremely limited resources such as RFID tag and it has resistance to known various attacks because of output bit stream for the use as pseudorandom generator. The proposed protocol is secure and effective because it is based on SSG.

Improving Customer Information Management System by Using Blockchain and Biometric Authentication (블록체인과 바이오메트릭 인증 기술을 이용한 고객 정보 관리 시스템의 개선 방안)

  • Na, YunSeok;Cho, Sangrae;Kim, Soo-hyung
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.28 no.4
    • /
    • pp.1021-1030
    • /
    • 2018
  • Nowadays, the ubiquitous environment that can utilize the computer everywhere is being formed. As the environment changes, services develop and manage systems and databases that can manage customer information to provide better services to customers through Information Technology. The system that most services maintain is a way of putting and managing customer information on the server. In this paper, we first find the problem in terms of security and convenience. After that, we propose a solution that improves the problem through blockchain technology and biometric authentication.

Certification system of individual Mobile terminal that using by Mobile barcode (모바일 바코드를 이용한 개인 모바일 단말기의 인증 시스템)

  • Lee, Kyung-Hwan;Song, Jeong-Young
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • v.9 no.1
    • /
    • pp.141-144
    • /
    • 2005
  • Contents of this paper strengthen security of data by applying encryption algorithm to use cellular phone and settlement by Mobile that is used synchronization method and quotes and prevent damage of bar-code peculation etc.. If divide system step by step to execute this, step that create Mobile bar-code and transmits by individual terminal after encryption, step displaying to individual Mobile terminal, step that above individual Mobile terminal and main server form assimilation and these are consisted of step that quote confirming above information confirmation and motive availability. For the actual example, confirm effectiveness of certification system through simulation.

  • PDF

NSG : A Security Enhancement of the E0 Cipher Using Nonlinear Algorithm in Bluetooth System (NSG : 비선형 알고리즘을 이용한 블루투스 E0 암호화시스템의 성능 개선)

  • Kim, Hyeong-Rag;Lee, Hun-Jae;Moon, Sang-Jae
    • The KIPS Transactions:PartC
    • /
    • v.16C no.3
    • /
    • pp.357-362
    • /
    • 2009
  • Summation generator can be easily made as a simple hardware or software and it's period and linear complexity are very high. So it is appropriate to mobile security system for ubiquitous environment. But it showed us the weakness by Golic's correlation attack and Meier's fast correlation attack. In this paper, we proposed a Nonlinear Summation Generator(NSG), which is improved by using LFSR and NFSR(nonlinear feedback shift register), is different from $E_0$ algorithm which use only LFSR in summation generator. It enhanced nonlinearity and is hard to decipher even though the correlation attack or fast correlation attack. We also analyzed the security aspects and the performances for the proposed algorithm.