• Title/Summary/Keyword: Personal Key

Search Result 606, Processing Time 0.03 seconds

RFID Distance Bounding Protocol Secure Against Mafia and Terrorist Fraud (테러리스트 공격과 마피아 공격에 안전한 RFID 거리 제한 프로토콜)

  • Kwon, Hye Jin;Kim, Soon Ja
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.39A no.11
    • /
    • pp.660-674
    • /
    • 2014
  • RFID system has been used in a variety of services. So, a lot of attacks like a free ride on the service, leakage of property or personal information are known. Therefore, the solutions that address these attacks have been proposed. Among the attacks, mafia fraud, a kind of relay attack, can not be addressed by common authentication protocol. So, Hancke and Kuhn used distance bounding protocol for RFID authentication. After that, Munilla and Peinado modified HK protocol by adding void challenge. So the mafia fraud success probability of adversary is lower than probability of HK protocol. Ahn et al. proposed a protocol that reduces number of a hash computation and traffic than MP protocol. Here, we show that MP protocol can not defend the terrorist fraud and is vulnerable to noise. And we show that also AYBN protocol is vulnerable to mafia fraud and key leakage. Moreover, we propose a new protocol and our experimental results show that our protocol is secure to terrorist and mafia fraud.

A Study on the Influence of Mobile Information Security on Mobile Office Service Satisfaction and Continuous Use in the Enterprise BYOD Environment (기업의 BYOD 환경에서 정보보안이 모바일 오피스 서비스 만족과 지속적 사용에 미치는 영향에 관한 연구)

  • Park, Byoung-Woo;Jang, Seok-Eun;Lee, Eun-Kyoung;Lee, Sang-Joon
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.28 no.4
    • /
    • pp.929-939
    • /
    • 2018
  • The mobile office, which was expected to be a key strategy for business operation through business innovation, was slow to spread from the BYOD environment to information security issues. This study analyzes mobile office information security and analyzes countermeasures against mobile information security threats to analyze the influence of information security factors on corporate satisfaction and continuous use of mobile office service. The results of the study were identified through the research model and hypothesis, quantitative empirical analysis based on the questionnaire and qualitative empirical analysis based on the expert interview. Through this study, practical implications and future directions for mobile office service satisfaction and continuous use are suggested.

Characterization of Uniform/Hybrid Complemented Group Cellular Automata with Rules 195/153/51 (전이규칙 195,153,51을 갖는 Uniform/Hybrid 여원 그룹 셀룰라 오토마타의 특성화)

  • Hwang, Yoon-Hee;Cho, Sung-Jin;Choi, Un-Sook;Kim, Seok-Tae
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • v.9 no.1
    • /
    • pp.315-318
    • /
    • 2005
  • Recently, the advent of wireless communication and other handhold devices like Personal Digital Assistants and smart cards have made in implementation of cryptosystems a major issue. One important aspect of modern day ciphers is the scope for hardware sharing between the encryption and decryption algorithm. The cellular Automata which have been proposed as an alternative to linear feedback shift registers(LFSRs) can be programmed to perform the operations without using any dedicated hardware. But to generalize and analyze CA is not easy. In this paper, we characterizes uniform/hybird complemented group CA with rules 195/153/51 that divide the entire state space into smaller spaces of maximal equal lengths. This properties can be useful in constructing key agreement algorithm.

  • PDF

Blockchain-Based Access Control Audit System for Next Generation Learning Management (차세대학습관리를 위한 블록체인 기반의 접근제어 감사시스템)

  • Chun, Ji Young;Noh, Geontae
    • KIPS Transactions on Software and Data Engineering
    • /
    • v.9 no.11
    • /
    • pp.351-356
    • /
    • 2020
  • With the spread of COVID-19 infections, the need for next-generation learning management system for undact education is rapidly increasing, and the Ministry of Education is planning future education through the establishment of fourth-generation NEIS. If the fourth-generation NEIS System is well utilized, there are advantages such as providing personalized education services and activating the use of educational data, but a solution to the illegal access problem in an access control environment where strict authorization is difficult due to various user rights. In this paper, we propose a blockchain-based access control audit system for next-generation learning management. Sensitive personal information is encrypted and stored using the proposed system, and when the auditor performs an audit later, a secret key for decryption is issued to ensure auditing. In addition, in order to prevent modification and deletion of stored log information, log information was stored in the blockchain to ensure stability. In this paper, a hierarchical ID-based encryption and a private blockchain are used so that higher-level institutions such as the Ministry of Education can hierarchically manage the access rights of each institution.

A Design and Implementation of Streamer for Real-Time Wireless Video Surveillance System (실시간 무선 영상 감시시스템을 위한 Streamer의 설계 및 구현)

  • Lee, Jin-Young;Kim, Heung-Jun;Lee, Kwang-Seok
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.11 no.2
    • /
    • pp.248-256
    • /
    • 2007
  • Recently, the network Infrastructure grows rapidly and the digital image compression technique has made remarkable progress. Therefore, the demand of the real-time image surveillance system which uses a network camera server has been increasing. Network Camera Server has emerged as an attractive alternative to the CCTV for the wireless video surveillance. In this article, the model of JPEG Streamer for collecting and delivering JPEG image is designed and realized as a key module for the wireless video surveillance system. The thread pool and shared memory have been used to improve the stability and efficiency of the JPEG Streamer. In addition, the concept of double buffering is of much benefit to improve the quality of real-time image. In this article, the wireless video surveillance system by using JPEG Streamer is suggested to send the real-time image through the wireless internet with the personal digital assistance (PDA).

A Cognitive Study on Jeong in Korean and Amae in Japanese (한국의 '정(情)'과 일본의 '아마에(甘え)'에 대한 인지적 고찰)

  • Kim, Myung-Hee
    • Cross-Cultural Studies
    • /
    • v.27
    • /
    • pp.471-496
    • /
    • 2012
  • Since Takeo Toi's discussion in The Anatomy of Dependence (1973), the concept of amae has generated considerable interest in the fields of psychology, anthropology, communication and other fields. However, there have been few agreements on the definition and functions of amae (Behrens, 2004). Furthermore, it has rarely drawn interest from linguists in general and has rarely been discussed in the context of social interaction. This study aims to examine the concept of amae in Japanese and the corresponding phenomena in Korean, and attempts to explore the similarities and differences between them. The prototype of the amae relationship is the mother-infant relationship (Doi,1973). Even an adult can assume the role of a baby, showing his or her need for dependence on others and expecting to be accepted. It turns out that amae-like phenomena frequently occur in everyday life in Korea as well (Lee, 1982). There is no single term for the concept, but it can be translated in many different ways in Korean, for example, aykyo, ayang, ungsek, erikwang, etc. It can have either positive or negative connotations depending on the situation. It seems that the psychological system that causes dependent behaviors such as ungsek in Korea is cheong, one of the key terms characterizing the Korean culture. Cheong, like amae, starts in the mother-infant relationship extending to familial and to other relationships. A corpus-based analysis shows that cheong is conceptualized as gluing people together, growing over time, and also potentially fatal because it assumes illogical, uncalculated, and personal relationships. In conclusion, unlike some Japanese scholars' claim that amae is the Japanese concept that exists only in Japan, it seems that similar phenomena do exist in Korea as well, but that Korean has no single term corresponding to amae in Japanese. It seems that cheong can be posited in Korean as the inner emotional system that makes amae-like behaviors possible, and that there is not single term, but many, designating the behaviors, possibly because the behaviors have a negative connotation and are not encouraged in Korean society.

A Lightweight and Privacy-Preserving Answer Collection Scheme for Mobile Crowdsourcing

  • Dai, Yingling;Weng, Jian;Yang, Anjia;Yu, Shui;Deng, Robert H.
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.15 no.8
    • /
    • pp.2827-2848
    • /
    • 2021
  • Mobile Crowdsourcing (MCS) has become an emerging paradigm evolved from crowdsourcing by employing advanced features of mobile devices such as smartphones to perform more complicated, especially spatial tasks. One of the key procedures in MCS is to collect answers from mobile users (workers), which may face several security issues. First, authentication is required to ensure that answers are from authorized workers. In addition, MCS tasks are usually location-dependent, so the collected answers could disclose workers' location privacy, which may discourage workers to participate in the tasks. Finally, the overhead occurred by authentication and privacy protection should be minimized since mobile devices are resource-constrained. Considering all the above concerns, in this paper, we propose a lightweight and privacy-preserving answer collection scheme for MCS. In the proposed scheme, we achieve anonymous authentication based on traceable ring signature, which provides authentication, anonymity, as well as traceability by enabling malicious workers tracing. In order to balance user location privacy and data availability, we propose a new concept named current location privacy, which means the location of the worker cannot be disclosed to anyone until a specified time. Since the leakage of current location will seriously threaten workers' personal safety, causing such as absence or presence disclosure attacks, it is necessary to pay attention to the current location privacy of workers in MCS. We encrypt the collected answers based on timed-release encryption, ensuring the secure transmission and high availability of data, as well as preserving the current location privacy of workers. Finally, we analyze the security and performance of the proposed scheme. The experimental results show that the computation costs of a worker depend on the number of ring signature members, which indicates the flexibility for a worker to choose an appropriate size of the group under considerations of privacy and efficiency.

The Study on the Pattern of Using Daily Behaviors by Time-Use Perception of Middle-Aged Women in One-Person Households (1인 가구 중년여성의 시간 사용 인지에 따른 생활시간 실태 연구)

  • Moon, Kyung-Ah;Cho, Won-Jee
    • The Journal of the Korea Contents Association
    • /
    • v.21 no.7
    • /
    • pp.601-608
    • /
    • 2021
  • This study was conducted using data from the 2019 National Statistical Office's Life Time Survey, It was to investigate the effect of time-perception on the time-use pattern of 594 single middle-aged women in the city. This study found that there were differences of time management for daily behaviors between the insufficiently-percieved group and the sufficiently-percieved group. The both spent the most time with personal management. Secondly, the sufficiently-perceived group spent the more time with leisure activities than the insufficiently one did; the insufficiently-perceived one did the more work than the sufficiently-perceived one. The founding suggested the difference of time-use pattern by time-perception of the middle-aged women in the city. Also, the leisure activities and work were key factors to understand the daily life of the city-living middle-aged women.

Cloud Computing Virtualization: It's Security Issues and Vulnerability (클라우드 컴퓨팅 가상화 기술: 보안이슈 및 취약점)

  • Kang, Dea-Hoon;Kim, Sang-Gu;Kim, HyunHo;Lee, HoonJae
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2014.05a
    • /
    • pp.234-237
    • /
    • 2014
  • The increasing of Cloud Computing technology among several companies has been a key strategy for IT services to provide desirable IT solutions to consumers of cloud services. More attention is concentrated to these core technologies that enable cloud services and more particularly to the virtualization aspect. The accessibility to a larger number of users is possible because of the usage of the data-intensive, data management and data integrity. Unfortunately, those useful services are vulnerable to kind of attacks by hackers, thus the security of personal information is in critical situation. To solve this to leakage vulnerability, and with the proliferation of cloud services, the cloud service providers adopt a security system with firewall, antivirus software and a large number of virtualized servers and Host. In this paper, a variety of virtualization technologies, threats and vulnerabilities are described with a complement of different security solutions as countermeasures.

  • PDF

A Delphi Study for Developing a Person-centered Dementia Care Online Education Program in Long-term Care Facilities (장기요양시설 인간중심 치매케어 온라인 교육 프로그램 개발을 위한 델파이 조사연구)

  • Kim, Da Eun;SaGong, Hae;Yoon, Ju Young
    • Research in Community and Public Health Nursing
    • /
    • v.30 no.3
    • /
    • pp.295-306
    • /
    • 2019
  • Purpose: There has been a growing recognition that person-centered care enhances the quality of life of nursing home residents with dementia. This study was conducted to develop a person-centered dementia care online education program for direct care staff in long-term care facilities. Methods: Delphi method with expert group was used to validate contents. We developed 61 draft items based on literature review. Twenty experts participated in consecutive three round surveys including 5-point Likert scale questions and open-ended questions. Based on experts' opinions, the content validity ratio for content validity and the coefficient of variation for stability were calculated. Results: Three-round Delphi surveys and additional feedback from the expert panel established a consensus of core contents: 1) dementia (7 categories), 2) person-centered care (6 categories), 3) communication (8 categories), and 4) behavioral and psychological symptoms of dementia (6 categories). Specific sub-categories in each category were differentiated according to the job qualifications (65 sub-categories for registered nurses, 64 sub-categories for nursing aids, and 41 sub-categories for personal care workers). Conclusion: This delphi study identified person-centered dementia education curricula, in which the person-centered approach should be a key policy priority in Korean long-term care system. Now it is urgently needed to develop education programs utilizing online platforms that enable efficient and continuous learning for long-term care staff, which can contribute to behavior changes in the person-centered dementia care approach and improvement of care quality in long-term care facilities.