• Title/Summary/Keyword: 유비쿼터스 보안

Search Result 479, Processing Time 0.026 seconds

A Study on the WSN Construction Factors for Implementation of U-Disaster Prevention (u-방재 기술 구현을 위한 WSN 구축요소에 관한 연구)

  • Lee, Seok-Cheol;Jeon, Tae-Gun;Sim, Hye-In;Kim, Chang-Soo
    • 한국방재학회:학술대회논문집
    • /
    • 2008.02a
    • /
    • pp.361-364
    • /
    • 2008
  • The Application Model in Wireless Sensor Networks(WSNs) consist of wireless sensor network based on sensor hardwares which is combined the micro-controller, chipset for wireless communication and sensors, middleware for dealing with data processing and user application for common service. Applications in WSN have been applied for environmental monitoring, smart factory and have concentrated the services based on remote monitoring applications which is difficult to watch the situation by human. In this paper, we described the construction model for applying for the Ubiquitous disaster prevention system and deal with its conformity. The proposed system includes the selecting the wireless sensor hardware, routing technique for u-Disaster Prevention, composition of middleware and web-interface for application services.

  • PDF

Passive and Cost Effective People Indoor Location Tracking System for Ubiquitous Healthcare (유비쿼터스 헬스케어를 위한 저비용, 수동형 실내 위치추적 시스템)

  • Chung Wan-Young;Singh Vinay Kumar;Lim Hyo-Taek
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.10 no.6
    • /
    • pp.1119-1123
    • /
    • 2006
  • Wireless sensor network plays a prominent role in tracking the location of the target outdoor or indoor. This paper describes the implementation of the passive indoor location tracking system using ultrasonic and RF technologies that provides accurate location in the form of user space and position in three dimensions. Our system used a combination of RF and ultrasonic technologies to provide a location-support service to users and applicants. Ceiling-mounted beacons were spread through the building, publishing location information on an RF signal. The person carried a listener and the listener determined the location by calculating the distance from three beacons using triangulation algorithm.

A Study on PKI Mechanisms with distributed CA for IEEE 802.15.3 High Rate WPAN (IEEE 802.15.3 High Rate WPAN을 위한 분산된 인종기관을 가지는 PKI 메커니즘 연구)

  • 박정우;양대헌;송주석
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.14 no.3
    • /
    • pp.125-135
    • /
    • 2004
  • IEEE 802.15.3 High Rate WPAN is a mechanism for wireless home network such as PDAs, digital video camcoder, etc. While symmetric keys are used for MAC layer security, the process of establishing a secure membership or a secure relationship is outside of the scope of the standard. In addition, to prepare for ubiquitous environment in the near future, it is important to study the process of establishing a secure relationship between DEVs in different dependent piconets. This paper propose a secure model and a process of establishing a secure relationship using PKI without a ousted certificate authority.

Economic Effects of Advance Diagnosis for Information Security: A Case Study (정보보호 사전진단제도의 경제적 효과에 대한 사례 분석)

  • Kong, Hee-Kyung;Kim, Tae-Sung
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.20 no.6
    • /
    • pp.157-169
    • /
    • 2010
  • As the information society changes into the ubiquitous computing society, the importance of information security has increased. Governments and enterprises are carrying out various information security activities to operate their information asset effectively. Since 2006, the Korean government has implemented 'Advance Diagnosis' policy to analyze the vulnerability of the information security from the early stage of the information system development to secure the information stability. This study proposes an analyzing framework for the economic effects of Advance Diagnosis for Information Security and presents an illustrative application em a real Advance Diagnosis case. The results of this study can be applied to secure the economic justification of government policies for the security of information systems.

The Learning system design and the implementation using Basic Ubiquitous (Ubiquitous 기반을 이용한 학습시스템 설계 및 구현)

  • Lee, Duck Ju;Lim, Dong Gyun;Shin, Seung Jung
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2010.04a
    • /
    • pp.190-193
    • /
    • 2010
  • 본 논문은 최근 전세계적으로 유통물류를 비롯한 산업 전반에 걸쳐 RFID(Radio Frequency Identification) 기술이 새로운 성장 동력으로 각광을 받고 있다. 유비쿼터스 시대에서 RFID는 빼놓을 수 없는 시스템 이다. RFID/USN 사업 추진시 공부하는 학생들이 RFID 시스템을 학습하기 위해서 자료를 구할 때는 비밀유지계약서를 체결해야 한다. RFID 시스템을 대부분 수입에 의존하고 있고, 기술 인력도 현재 부족하여 어려움을 겪고 있다. 이런 문제점을 보안하기 위하여 공부하는 학생들이 RFID 시스템을 쉽게 접근할 수 있도록 제작하였다. 여러 가지 규약에 의해 제안되었던 문제점을 해결하는데 의의가 있다. 별도의 RFID 전용칩을 사용하지 않고, 마이크로콘트롤러를 사용하여 저가격 RFID 학습 시스템을 구현하였다. 13.56MHz RFID 시스템의 ISO14443A 읽기/쓰기 방법에 대해 설명하고, HF 대역의 13.56MHz RFID 시스템의 구성에 대해서 소개한다. 구현한 RFID 시스템을 활용하여 응용 프로그램을 제작하여 실습을 진행하였다. RFID 시스템의 구조를 쉽게 이해하기 위하여 각각의 모듈로 분류하여 나누어 제작하였다. 태그의 EEPROM 메모리에 정보가 어떻게 저장 되는지를 학습할 수 있도록 C#을 사용하여 응용 프로그램을 설계 및 구현하여 실습하였다. 학습자가 RFID 시스템이 산업분야에서 어떻게 활용되는지 이해를 돕기 위하여 학생증 발급 시스템을 구현하였다.

A Study on Key Distribution Using Level-key in Wireless Sensor Networks (무선 센서 네트워크에서 레벨 키를 이용한 효율적인 키 분배 방법에 관한 연구)

  • Kim, Do-Hoi;Choi, Jin-Young;Chung, Tai-Myoung
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2007.11a
    • /
    • pp.815-818
    • /
    • 2007
  • 최근 유비쿼터스 시대가 도래하면서 센서 네트워크의 중요성이 대두되고 있다. 센서 네트워크란 필요한 모든 곳에 전자태그를 부착하고, 이를 통해 사물의 인식 정보를 기본으로 주변의 환경정보까지 각종 센서를 통해 실시간으로 수집하여 관리, 통제할 수 있도록 구성한 네트워크를 말한다. 이러한 센서 네트워크에서 각 노드들은 에너지, 계산 능력, 대역폭 등에 상당한 제한을 받으며, 정보가 저장된 장치를 쉽게 도난 당할 수도 있다. 특히 보안 통신을 하기 위해 키 설정 및 관리는 필수적이며 지금까지 그로 인해 여러 가지 키 분배 및 관리 방법이 제안되었다. 본 논문은 군대 등의 특정 상황과 같이 계층적 구조를 가지는 센서 네트워크에서 더욱 효율적으로 통신을 할 수 있는 키 관리 방법을 소개하고자 한다. 기존의 계층적 구조의 취약점을 분석하고, 이를 바탕으로 레벨 키를 제안하여 같은 레벨에서 다른 그룹간 통신이 가능한 효율적인 키 분배 방안을 제시한다.

Analysis of the Bogus Routing Information Attacks in Sensor Networks (센서 네트워크에서 AODV 라우팅 정보 변조공격에 대한 분석)

  • Lee, Myung-Jin;Kim, Mi-Hui;Chae, Ki-Joon;Kim, Ho-Won
    • The KIPS Transactions:PartC
    • /
    • v.14C no.3 s.113
    • /
    • pp.229-238
    • /
    • 2007
  • Sensor networks consist of many tiny sensor nodes that collaborate among themselves to collect, process, analyze, and disseminate data. In sensor networks, sensor nodes are typically powered by batteries, and have limited computing resources. Moreover, the redeployment of nodes by energy exhaustion or their movement makes network topology change dynamically. These features incur problems that do not appear in traditional, wired networks. Security in sensor networks is challenging problem due to the nature of wireless communication and the lack of resources. Several efforts are underway to provide security services in sensor networks, but most of them are preventive approaches based on cryptography. However, sensor nodes are extremely vulnerable to capture or key compromise. To ensure the security of the network, it is critical to develop suity mechanisms that can survive malicious attacks from "insiders" who have access to the keying materials or the full control of some nodes. In order to protect against insider attacks, it is necessary to understand how an insider can attack a sensor network. Several attacks have been discussed in the literature. However, insider attacks in general have not been thoroughly studied and verified. In this paper, we study the insider attacks against routing protocols in sensor networks using the Ad-hoc On-Demand Distance Vector (AODV) protocol. We identify the goals of attack, and then study how to achieve these goals by modifying of the routing messages. Finally, with the simulation we study how an attacker affects the sensor networks. After we understand the features of inside attacker, we propose a detect mechanism using hop count information.

Energy Efficient Distributed Intrusion Detection Architecture using mHEED on Sensor Networks (센서 네트워크에서 mHEED를 이용한 에너지 효율적인 분산 침입탐지 구조)

  • Kim, Mi-Hui;Kim, Ji-Sun;Chae, Ki-Joon
    • The KIPS Transactions:PartC
    • /
    • v.16C no.2
    • /
    • pp.151-164
    • /
    • 2009
  • The importance of sensor networks as a base of ubiquitous computing realization is being highlighted, and espicially the security is recognized as an important research isuue, because of their characteristics.Several efforts are underway to provide security services in sensor networks, but most of them are preventive approaches based on cryptography. However, sensor nodes are extremely vulnerable to capture or key compromise. To ensure the security of the network, it is critical to develop security Intrusion Detection System (IDS) that can survive malicious attacks from "insiders" who have access to keying materials or the full control of some nodes, taking their charateristics into consideration. In this perper, we design a distributed and adaptive IDS architecture on sensor networks, respecting both of energy efficiency and IDS efficiency. Utilizing a modified HEED algorithm, a clustering algorithm, distributed IDS nodes (dIDS) are selected according to node's residual energy and degree. Then the monitoring results of dIDSswith detection codes are transferred to dIDSs in next round, in order to perform consecutive and integrated IDS process and urgent report are sent through high priority messages. With the simulation we show that the superiorities of our architecture in the the efficiency, overhead, and detection capability view, in comparison with a recent existent research, adaptive IDS.

Ubiquitous Sensor Network Application Strategy of Security Companies (시큐리티업체의 유비쿼터스 센서네트워크(USN) 응용전략)

  • Jang, Ye-Jin;An, Byeong-Su;Ju, Choul-Hyun
    • Korean Security Journal
    • /
    • no.21
    • /
    • pp.75-94
    • /
    • 2009
  • Since mechanical security systems are mostly composed of electronic, information and communication devices, they have effects in the aspects of overall social environment and crime-oriented environment. Also, the importance is increasing for wireless recognition of RFID and tracing function, which will be usefully utilized in controlling the incomings and outgoings of people/vehicles or allowance, surveillance and control. This is resulting from the increase in the care for the elderly according to the overall social environment, namely, the aging society, and the number of women entering, as well as the increase in the number of heinous crimes. The purpose of this study is to examine the theoretical considerations on ubiquitous sensor network and present a direction for securities companies for their development by focusing on the technological and application areas. To present strategies of response to a new environment for security companies, First, a diversification strategy is needed for security companies. The survival of only high level of security companies in accordance with the principle of liberal market competition will bring forth qualitative growth and competitiveness of security market. Second, active promotion by security companies is needed. It is no exaggeration to say that we are living in the modern society in the sea of advertisements and propaganda. The promotional activities that emphasize the areas of activity or importance of security need to be actively carried out using the mass media to change the aware of people regarding security companies, and they need to come up with a plan to simultaneously carry out the promotional activities that emphasize the public aspect of security by well utilizing the recent trend that the activities of security agents are being used as a topic in movies or TV dramas. Third, technically complementary establishment of ubiquitous sensor network and electronic tag is needed. Since they are used in mobile electronic tag services such as U-Home and U-Health Care, they are used throughout our lives by forming electronic tag environment within safe ubiquitous sensor network based on the existing privacy guideline for the support of mobile electronic tag terminal commercialization, reduction in communication and information usage costs, continuous technical development and strengthening of privacy protection, and the system of cooperation of academic-industrial-research needs to be established among the academic world and private research institutes for these parts.

  • PDF

Designed and Development of Location Tracking System by The Short-Range Radio Frequency Relay Algorithm (근거리 RF중계알고리즘에 의한 구내 위치추적시스템 연구)

  • Park, Sang-Min;Lee, Gong;Lee, Sang-Keun
    • Convergence Security Journal
    • /
    • v.8 no.3
    • /
    • pp.73-81
    • /
    • 2008
  • We can find easily about researches or technical development that deal with grasping the location of an object with GPS(Global Positioning System) in order to use them as a useful information. Most researches or technical development on application of tracing have been developed for the purpose of tracing objects in broad area as physical distribution or transportation, but recently, there are many researches on tracing materials in premise area as a fork lift, carts, or the equipment of work. In general, a system that utilizes location information of objects needs data communication network to transmit location data and it ensures data communication network by using common networks(SK, LG, KFT) or wireless LAN. However these two methods need monthly payment for the rental fee or require considerable amount of investment for the early stage so it is difficult to use them merely for tracing premise subjects. This study was conducted to build a tracing system for premise area by local area RF relay algorithm with low cost applying RF relay algorithm to local area wireless communication(ZIGBEE, 424MHz, Bluetooth, 900MHz) system in order to supplement these demerits and included relay algorithm, RF locating information terminal, local area RF gab-fillers, a plan for collection server of locating information, and the way of realization as they are needed in this system. I consider that this study would be applicable with flexibility in the industry area that needs tracing solution within a specific area or needs ensuring data communication network, to transmit data in ubiquitous environment, by easier and more rapid way with lower cost.

  • PDF