• Title/Summary/Keyword: Capability Token

Search Result 18, Processing Time 0.025 seconds

Privacy of Capability Token in the IoT Service System

  • Jang, Deresa;Kim, Jin-bo;Kim, Mi-Sun;Seo, Jae-Hyun
    • Journal of Multimedia Information System
    • /
    • v.3 no.3
    • /
    • pp.103-110
    • /
    • 2016
  • The recent development of the Internet of things (IoT) has led to the introduction of new access control measures. Even during the access control for security, however, there might be privacy infringements due to unwanted information provision and collection. Measures to control this process are therefore required. This paper defines the structure and policies of tokens to protect privacy that can be exposed through the token information when you use the capability token in the IoT service system.

Design and Implementation of The Capability Token based Access Control System in the Internet of Things (IoT에서 Capability 토큰 기반 접근제어 시스템 설계 및 구현)

  • Lee, Bum-Ki;Kim, Mi-Sun;Seo, Jae-Hyun
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.25 no.2
    • /
    • pp.439-448
    • /
    • 2015
  • IoT (Internet of Things) propels current networked communities into a advanced hyper-connected society/world where uniquely identifiable embedded computing devices are associated with the existing internet infrastructure. Therefore, the IoT services go beyond mere M2M (Machine-to-Machine communications) and should be able to empower users with more flexible communication capabilities over protocols, domains, and applications. In addition, The access control in IoT need a differentiated methods from the traditional access control to increase a security and dependability. In this paper, we describe implementation and design of the capability token based system for secure access control in IoT environments. In the proposed system, Authorities are symbolized into concepts of the capability tokens, and the access control systems manage the tokens, creation, (re)delegation and revocation. The proposed system is expected to decrease the process time of access control by using capability tokens.

Performability Analysis of Token Ring Networks using Hierarchical Modeling

  • Ro, Cheul-Woo;Park, Artem
    • International Journal of Contents
    • /
    • v.5 no.4
    • /
    • pp.88-93
    • /
    • 2009
  • It is important for communication networks to possess the capability to overcome failures and provide survivable services. We address modeling and analysis of performability affected by both performance and availability of system components for a token ring network under failure and repair conditions. Stochastic reward nets (SRN) is an extension of stochastic Petri nets and provides compact modeling facilities for system analysis. In this paper, hierarchical SRN modeling techniques are used to overcome state largeness problem. The upper level model is used to compute availability and the lower level model captures the performance. And Normalized Throughput Loss (NTL) is obtained for the composite ring network for each node failures occurrence as a performability measure. One of the key contributions of this paper constitutes the Petri nets modeling techniques instead of complicate numerical analysis of Markov chains and easy way of performability analysis for a token ring network under SRN reward concepts.

The Access Control Platform of the IoT Service Using the CapSG (CapSG를 이용한 IoT 서비스 접근제어 플랫폼)

  • Kim, Jin-Bo;Jang, Deresa;Kim, Mi-Sun;Seo, Jae-Hyun
    • KIPS Transactions on Software and Data Engineering
    • /
    • v.4 no.9
    • /
    • pp.337-346
    • /
    • 2015
  • There is great need for efficient user rights management method to provide a flexible service on variety protocols, domains, applications of IoT environments. In this paper, we propose a IoT service platform with CapSG to provide efficient access control for IoT various services of the environment. CapSG uses a token including authentication and access rights to perform authentication and access control service entity providing services. In addition, the generated token for service management, delegation, revocation, and provides a function such as denied. Also, it provides functions such as generation, delegation, disposal and rejection for service token management. In this paper, it provides the flexibility and efficiency of the access control for various services require of the IoT because of it is available to access control specific domain service by using the token group for each domain and is designed to access control using specific service token of tokens group.

Analysis of Several Digital Network Technologies for Hard Real-time Communications in Nuclear Plant

  • Song, Ki-Sang;No, Hee-Cheon;Kim, Dong-Hun;Koo, In-Soo
    • Nuclear Engineering and Technology
    • /
    • v.31 no.2
    • /
    • pp.226-235
    • /
    • 1999
  • Applying digital network technology for advanced nuclear plant requires deterministic communication for tight safety requirements, timely and reliable data delivery for operation-critical and mission-critical characteristics of nuclear plant. Communication protocols, such as IEEE 802/4 Token Bus, IEEE 802/5 Token Ring, FDDI, and ARCnet, which have deterministic communication capability are partially applied to several nuclear power plants. Although digital communication technologies have many advantages, it is necessary to consider the noise immunity from electromagnetic interference (EMI), electrical interference, impulse noise, and heat noise before selecting specific digital network technology for nuclear plant. In this paper, we consider the token frame loss and data frame loss rate due to the link error event, frame size, and link data rate in different protocols, and evaluate the possibility of failure to meet the hard real-time requirement in nuclear plant.

  • PDF

A Syllabic Segmentation Method for the Korean Continuous Speech (우리말 연속음성의 음절 분할법)

  • 한학용;고시영;허강인
    • The Journal of the Acoustical Society of Korea
    • /
    • v.20 no.3
    • /
    • pp.70-75
    • /
    • 2001
  • This paper proposes a syllabic segmentation method for the korean continuous speech. This method are formed three major steps as follows. (1) labeling the vowel, consonants, silence units and forming the Token the sequence of speech data using the segmental parameter in the time domain, pitch, energy, ZCR and PVR. (2) scanning the Token in the structure of korean syllable using the parser designed by the finite state automata, and (3) re-segmenting the syllable parts witch have two or more syllables using the pseudo-syllable nucleus information. Experimental results for the capability evaluation toward the proposed method regarding to the continuous words and sentence units are 73.5%, 85.9%, respectively.

  • PDF

A Study of Capability Token Management for Authentication and Access control in the Internet of Things (사물인터넷 환경에서 인증 및 접근제어를 위한 Capability 토큰 관리에 관한 연구)

  • Nam, Youn Sung;Kim, Jin-Bo;Kim, Mi-Sun;Seo, Jae-Hyun
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2015.10a
    • /
    • pp.756-758
    • /
    • 2015
  • 사물인터넷 환경에서 접근제어는 다양한 단말간 통신이 발생하고, 더 많은 객체간의 통신이 이루어지기 때문에 전통적인 접근제어와 차별화된 방법이 필요하다. 본 논문에서는 사물인터넷 환경에서 접근제어를 위하여 사용자 및 서비스 요청자의 인증정보 및 접근 권한 정보를 하나의 토큰으로 제공하며, 한번의 인증으로 세션을 유지하여 리소스 서비스에 접근할 수 있는 토큰 구조 및 관리 기술에 대해 연구하였다.

Implementation and Evaluation of IoT Service System for Security Enhancement (보안성 향상을 위한 IoT 서비스 시스템 구현 및 평가)

  • Kim, Jin-bo;Kim, Mi-sun;Seo, Jae-hyun
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.27 no.2
    • /
    • pp.181-192
    • /
    • 2017
  • Internet of Things includes the whole process of collected information generated from a variety of objects, as well as analyzing and sharing it, and providing useful information services to people. This study seeks ways to improve security and safety in the areas of service security technology, ID management technology and service access control, all of which take place in the IoT environment. We have implemented the services that can design and issue C&C (Certificate and Capability) service token authentication, which is based on a public key, to improve the service security. In addition, we suggest LCRS (Left Child-Right Sibling) resource model management for the efficient control of resources when generating the resource services from the data collected from node devices. We also implemented an IoT services platform to manage URL security of the resource services and perform access control for services.

Optimized patch feature extraction using CNN for emotion recognition (감정 인식을 위해 CNN을 사용한 최적화된 패치 특징 추출)

  • Irfan Haider;Aera kim;Guee-Sang Lee;Soo-Hyung Kim
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2023.05a
    • /
    • pp.510-512
    • /
    • 2023
  • In order to enhance a model's capability for detecting facial expressions, this research suggests a pipeline that makes use of the GradCAM component. The patching module and the pseudo-labeling module make up the pipeline. The patching component takes the original face image and divides it into four equal parts. These parts are then each input into a 2Dconvolutional layer to produce a feature vector. Each picture segment is assigned a weight token using GradCAM in the pseudo-labeling module, and this token is then merged with the feature vector using principal component analysis. A convolutional neural network based on transfer learning technique is then utilized to extract the deep features. This technique applied on a public dataset MMI and achieved a validation accuracy of 96.06% which is showing the effectiveness of our method.

Implementation of Bandwidth Allocation Scheme in the MS/TP Protocol (MS/TP 프로토콜에서 대역폭할당기법구현 및 실험적 검증)

  • Hong, Seung-Ho;Song, Won-Seok;Kwon, Young-Chan
    • Proceedings of the KIEE Conference
    • /
    • 2004.11c
    • /
    • pp.52-55
    • /
    • 2004
  • Digital communication networks have become a core technology in advanced building automation systems. BACnet(${\underline{B}}uilding$ ${\underline{A}}utomation$ and ${\underline{C}}ontrol$ ${\underline{net}}works$) is a standard data communication protocol designed specifically for building automation and control systems. BACnet adopts Master-Slave/Token-Passing (MS/TP) protocol as one of its field level networks. In this study, we introduce a method of implementing bandwidth allocation scheme in the MS/TP protocol. The bandwidth allocation scheme improves the capability of real-time communication of the original MS/TP protocol. The bandwidth allocation scheme introduced in this paper can be easily implemented in the existing MS/TP protocol with a slight modification. In this study, we actually developed the hardware and firmware of MS/TP module in which bandwidth allocation scheme is implemented.

  • PDF