• Title/Summary/Keyword: Device Network

Search Result 2,413, Processing Time 0.027 seconds

A Security Vulnerability Analysis for Printer Kiosks (무인 복합 출력기 솔루션의 취약성 분석)

  • Ji, Woojoong;Kim, Hyoungshick
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.29 no.1
    • /
    • pp.165-174
    • /
    • 2019
  • They are frequently used today in public places such as street, subway, school or library. Since users can sometimes print documents that contain confidential data using Printer Kiosks, the devices should store and manage the documents securely. In this paper, we identify potential security threats in Printer Kiosks and suggest practical attack scenarios that can take place. To show the feasibility of suggested attack, we analyzed network traffic that were generated by the real Printer Kiosk device. As a result of our analysis, we have found that attackers can access other users' scanned files and access other users' documents from Printer Kiosk's home page. We confirmed that using our attack, we could retrieve other users' personal data.

Dynamic Thermal Rating of Transmission Line Based on Environmental Parameter Estimation

  • Sun, Zidan;Yan, Zhijie;Liang, Likai;Wei, Ran;Wang, Wei
    • Journal of Information Processing Systems
    • /
    • v.15 no.2
    • /
    • pp.386-398
    • /
    • 2019
  • The transmission capacity of transmission lines is affected by environmental parameters such as ambient temperature, wind speed, wind direction and so on. The environmental parameters can be measured by the installed measuring devices. However, it is impossible to install the environmental measuring devices throughout the line, especially considering economic cost of power grid. Taking into account the limited number of measuring devices and the distribution characteristics of environment parameters and transmission lines, this paper first studies the environmental parameter estimating method of inverse distance weighted interpolation and ordinary Kriging interpolation. Dynamic thermal rating of transmission lines based on IEEE standard and CIGRE standard thermal equivalent equation is researched and the key parameters that affect the load capacity of overhead lines is identified. Finally, the distributed thermal rating of transmission line is realized by using the data obtained from China meteorological data network. The cost of the environmental measurement device is reduced, and the accuracy of dynamic rating is improved.

User Modeling Using User Preference and User Life Pattern Based on Personal Bio Data and SNS Data

  • Song, Hyejin;Lee, Kihoon;Moon, Nammee
    • Journal of Information Processing Systems
    • /
    • v.15 no.3
    • /
    • pp.645-654
    • /
    • 2019
  • The purpose of this study was to collect and analyze personal bio data and social network services (SNS) data, derive user preference and user life pattern, and propose intuitive and precise user modeling. This study not only tried to conduct eye tracking experiments using various smart devices to be the ground of the recommendation system considering the attribute of smart devices, but also derived classification preference by analyzing eye tracking data of collected bio data and SNS data. In addition, this study intended to combine and analyze preference of the common classification of the two types of data, derive final preference by each smart device, and based on user life pattern extracted from final preference and collected bio data (amount of activity, sleep), draw the similarity between users using Pearson correlation coefficient. Through derivation of preference considering the attribute of smart devices, it could be found that users would be influenced by smart devices. With user modeling using user behavior pattern, eye tracking, and user preference, this study tried to contribute to the research on the recommendation system that should precisely reflect user tendency.

Wide and Dual-Band MIMO Antenna with Omnidirectional and Directional Radiation Patterns for Indoor Access Points

  • Yeom, Insu;Jung, Young Bae;Jung, Chang Won
    • Journal of electromagnetic engineering and science
    • /
    • v.19 no.1
    • /
    • pp.20-30
    • /
    • 2019
  • A wide-band multiple-input multiple-output (MIMO) antenna with dual-band (2.4 and 5 GHz) operation is proposed for premium indoor access points (IAPs). Typically, an omni-directional pattern is used for dipole antennas and a directional radiation pattern is used for patch antennas. In this paper, both antenna types were used to compare their performance with that of the proposed $2{\times}2$ MIMO antenna. We simulated and measured the performance of the MIMO antenna, including the isolation, envelope correlation coefficient (ECC), mean effective gain (MEG) for the IAPs, and the throughput, in order to determine its communication quality. The performance of the antennas was analyzed according to the ECC and MEG. The proposed antenna has sufficient performance and excellent characteristics, making it suitable for IAPs. We analyzed the communication performance of wireless networks using the throughput data of a typical office environment. The network throughput of an 802.11n device was used for the comparison and was conducted according to the antenna type. The results showed that the values of the ECC, MEG, and the throughput have unique characteristics in terms of their directivity, antenna gains, isolation, etc. This paper also discusses the communication performance of various aspects of MIMO in multipath situations.

Chronological change of smart phone's games by pc oline games (PC온라인게임과 스마트폰 게임의 변화에 대한 연구)

  • Kang, Sung-gu;Kang, Hyo-soon
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2014.05a
    • /
    • pp.925-928
    • /
    • 2014
  • Currently, smart phone game's advances are going to more similar to the development of a computer games. there are many similar portions between an affinity for the genre of the game and the kind of developed game, which smart-phone technology is going to reach the computer's ability. In this paper, According to the pc online games and mobile game's graphics technology and the development of the network, there are analysis about An preference of the game by the user by the chronological situation, and about factors of results of preferred direction by the user.

  • PDF

Localization of People at Risk based on the Fire Alarm Networks and Bluetooth (화재경보망과 블루투스 기반으로 위험에 처한 사람의 위치 파악)

  • Kim, Chae-Won;Son, Joo-Young
    • Proceedings of the Korean Institute of Navigation and Port Research Conference
    • /
    • 2019.05a
    • /
    • pp.159-160
    • /
    • 2019
  • It would be very important to localize people at risk as soon as possible in order to minimize the damage. Generally the infrastructure should be deployed additionally for indoor positioning system. In this paper, we proposed an indoor localization system for people at risk using the existing fire alarm networks. The system detects the signal of smart devices of people in danger immediately and let the main alarm controller ring all alarms in vessel and display the position. Thus, the proposed system can make the burden much less to deploy additional network and infrastructure.

  • PDF

CCTV-Based Multi-Factor Authentication System

  • Kwon, Byoung-Wook;Sharma, Pradip Kumar;Park, Jong-Hyuk
    • Journal of Information Processing Systems
    • /
    • v.15 no.4
    • /
    • pp.904-919
    • /
    • 2019
  • Many security systems rely solely on solutions based on Artificial Intelligence, which are weak in nature. These security solutions can be easily manipulated by malicious users who can gain unlawful access. Some security systems suggest using fingerprint-based solutions, but they can be easily deceived by copying fingerprints with clay. Image-based security is undoubtedly easy to manipulate, but it is also a solution that does not require any special training on the part of the user. In this paper, we propose a multi-factor security framework that operates in a three-step process to authenticate the user. The motivation of the research lies in utilizing commonly available and inexpensive devices such as onsite CCTV cameras and smartphone camera and providing fully secure user authentication. We have used technologies such as Argon2 for hashing image features and physically unclonable identification for secure device-server communication. We also discuss the methodological workflow of the proposed multi-factor authentication framework. In addition, we present the service scenario of the proposed model. Finally, we analyze qualitatively the proposed model and compare it with state-of-the-art methods to evaluate the usability of the model in real-world applications.

Design of Portable Intelligent Surveillance System based on Edge Cloud and Micro Cloud (에지 클라우드 및 마이크로 클라우드 기반의 이동형 지능 영상감시 시스템 설계)

  • Park, Sun;Cha, ByungRae;Kim, JongWon
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2019.05a
    • /
    • pp.556-557
    • /
    • 2019
  • The current video surveillance system is the third generation, and the video device has developed from low image quality to high image quality. The video surveillance solution has improved from the simple type to the intelligent type. However, as the equipment and technology for these video surveillance systems become more complicated and diversified, they are increasingly dependent on infrastructure, such as faster network speed and stable power supply. On the other hand, there is a growing need for video surveillance in areas where basic infrastructure is limited, such as power and communications. In this paper, we propose a system that can support intelligent video surveillance in a region where basic infrastructure is limited.

  • PDF

Analysis of Web Browser Security Configuration Options

  • Jillepalli, Ananth A.;de Leon, Daniel Conte;Steiner, Stuart;Alves-Foss, Jim
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.12 no.12
    • /
    • pp.6139-6160
    • /
    • 2018
  • For ease of use and access, web browsers are now being used to access and modify sensitive data and systems including critical control systems. Due to their computational capabilities and network connectivity, browsers are vulnerable to several types of attacks, even when fully updated. Browsers are also the main target of phishing attacks. Many browser attacks, including phishing, could be prevented or mitigated by using site-, user-, and device-specific security configurations. However, we discovered that all major browsers expose disparate security configuration procedures, option names, values, and semantics. This results in an extremely hard to secure web browsing ecosystem. We analyzed more than a 1000 browser security configuration options in three major browsers and found that only 13 configuration options had syntactic and semantic similarity, while 4 configuration options had semantic similarity, but not syntactic similarity. We: a) describe the results of our in-depth analysis of browser security configuration options; b) demonstrate the complexity of policy-based configuration of web browsers; c) describe a knowledge-based solution that would enable organizations to implement highly-granular and policy-level secure configurations for their information and operational technology browsing infrastructures at the enterprise scale; and d) argue for necessity of developing a common language and semantics for web browser configurations.

A Design and Implementation of Missing Person Identification System using face Recognition

  • Shin, Jong-Hwan;Park, Chan-Mi;Lee, Heon-Ju;Lee, Seoung-Hyeon;Lee, Jae-Kwang
    • Journal of the Korea Society of Computer and Information
    • /
    • v.26 no.2
    • /
    • pp.19-25
    • /
    • 2021
  • In this paper proposes a method of finding missing persons based on face-recognition technology and deep learning. In this paper, a real-time face-recognition technology was developed, which performs face verification and improves the accuracy of face identification through data fortification for face recognition and convolutional neural network(CNN)-based image learning after the pre-processing of images transmitted from a mobile device. In identifying a missing person's image using the system implemented in this paper, the model that learned both original and blur-processed data performed the best. Further, a model using the pre-learned Noisy Student outperformed the one not using the same, but it has had a limitation of producing high levels of deflection and dispersion.