• Title/Summary/Keyword: Physical security

Search Result 1,047, Processing Time 0.025 seconds

A New Graphical Password Scheme Based on Universal Design (유니버설 디자인에 기반을 둔 새로운 그래픽 패스워드 기법)

  • Yang, Gi-Chul;Kim, Hwangyong
    • Journal of Digital Convergence
    • /
    • v.12 no.5
    • /
    • pp.231-238
    • /
    • 2014
  • Graphical passwords using images have been developed to solve problems in text based password recognition. The basic recognition process scheme of graphical passwords is clicking certain points on the screen image in correct order. In this pre-developed method of graphical passwords the recognition will fail if the precise positions are not clicked. A new graphical password system called PassPositions is introduced in this paper. PassPositions is a new graphical password scheme which is using relative positions never used earlier graphical password schemes. PassPositions is a graphical password scheme based on universal design that everybody can use conveniently without regarding their physical conditions.

Relationship among Chronic Disease, Health Status and Health Related Lifestyle of Rural Elderly by Gender (농촌노인의 성별에 따른 만성질환과 건강상태 및 건강생활양식)

  • Cho, Yoo-Hyang
    • Korean Journal of Health Education and Promotion
    • /
    • v.26 no.2
    • /
    • pp.35-47
    • /
    • 2009
  • Purpose: The purpose of this study was to investigate the chronic disease, health status and lifestyle, and to test the chronic disease and health status and lifestyle of rural elderly by gender. Method: The interview survey was performed in September 2004 with structured questionnaires(Scale of Long-Term Health and Welfare Need Survey) to 770 of the elderly who lived in Muan-Gun of Chunnam Province. The percentage, Chi-squire test and regression method were used for some of the cross-sectional data. Results: The 770 elderly respondents were composed of 51.3% male and 48.7% female. 59.1% of the elderly had chronic disease. About the subjective health status that 54.3% of the respondents have been answered not good health status, 87.9% of the respondents have been health examination. The related variables of chronic disease and general characteristics were education and religious level in male, age, marital status, type of social security, education and religious level in female, and health status variables were subjective health status, cognitive function, ADL, IADL, and lifestyle factors was exercise in male, examination in female. Conclusion: These results suggested that special health promotion and education programs of the health habits such as physical exercise and health examination were necessities for the elderly of rural area.

Efficient and Secure Routing Protocol forWireless Sensor Networks through SNR Based Dynamic Clustering Mechanisms

  • Ganesh, Subramanian;Amutha, Ramachandran
    • Journal of Communications and Networks
    • /
    • v.15 no.4
    • /
    • pp.422-429
    • /
    • 2013
  • Advances in wireless sensor network (WSN) technology have enabled small and low-cost sensors with the capability of sensing various types of physical and environmental conditions, data processing, and wireless communication. In the WSN, the sensor nodes have a limited transmission range and their processing and storage capabilities as well as their energy resources are limited. A triple umpiring system has already been proved for its better performance in WSNs. The clustering technique is effective in prolonging the lifetime of the WSN. In this study, we have modified the ad-hoc on demand distance vector routing by incorporating signal-to-noise ratio (SNR) based dynamic clustering. The proposed scheme, which is an efficient and secure routing protocol for wireless sensor networks through SNR-based dynamic clustering (ESRPSDC) mechanisms, can partition the nodes into clusters and select the cluster head (CH) among the nodes based on the energy, and non CH nodes join with a specific CH based on the SNR values. Error recovery has been implemented during the inter-cluster routing in order to avoid end-to-end error recovery. Security has been achieved by isolating the malicious nodes using sink-based routing pattern analysis. Extensive investigation studies using a global mobile simulator have shown that this hybrid ESRP significantly improves the energy efficiency and packet reception rate as compared with the SNR unaware routing algorithms such as the low energy aware adaptive clustering hierarchy and power efficient gathering in sensor information systems.

Simple Identification Methods for Unknown Suspicious White Powders using Microfluidic-based Platform (미세유체 기반의 플랫폼을 이용한 미지의 백색가루 간이식별 탐지방안)

  • Park, Jae Woo;Song, Jiyoung;Na, Sang Cheol;Byun, Kisik;Jeon, Noo Li
    • Journal of the Korea Institute of Military Science and Technology
    • /
    • v.20 no.6
    • /
    • pp.853-859
    • /
    • 2017
  • Terrorists always threats the global security with the possibility of using prohibited warfare, NBCs(Nuclear, Biological and Chemical Warfare). Compared to other prohibited warfares, most of biological warfare agents (BWAs) have no physical properties and time delays from spread to affect. Therefore the early detection is important to protect and decontaminate from BWAs. On the preliminary detection stage for suspicious material, most of detection kits only serve to know weather the BWAs exists or not. Due to this reason, simple field confirmation testing for suspicious substances have been used to identify materials which show negative result on detection kits. Considering the current Lab on a Chip(LOC) technologies, we suggest simple identification platform for unknown suspicious substances based on paper fluidics. We hope that our research will envision the future direction for the specific point-of-view for LOC technologies on detection strategy of BWAs.

Tag-Reader Mutual Authentication Protocol for secure RFID environments (안전한 RFID 환경을 위한 태그-리더 상호 인증 프로토콜)

  • Lee, Young-Seok;Choi, Hoon
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.19 no.2
    • /
    • pp.357-364
    • /
    • 2015
  • Tags and Readers is receiving and sending the data using the wireless communication in the RFID environment. Therefore, it could allow an attacker to participate in the network without the physical constraints, which can be easily exposed to a variety of attacks, such as taps and data forgery. Also, it is not easy to apply the security techniques to defend external attacks because the resource constraints of RFID tags is high. In this paper, new tag-reader mutual authentication protocol is proposed to protect the external cyber attacks such as spoofing attacks, replay attacks, traffic analysis attacks, location tracking attacks. The performance evaluation of the proposed mutual authentication protocol is performed and the simulation results are presented.

Design and Implementation of Hybrid VR lock system by Arduino Control (아두이노 제어를 통한 증강현실 도어록 설계 및 구현)

  • Lee, Kyung-Mu;Kim, Jin-Il
    • Journal of the Institute of Convergence Signal Processing
    • /
    • v.15 no.3
    • /
    • pp.97-103
    • /
    • 2014
  • Recently, digital door locks have been widely used as physical security devices for the door. Although they are convenient compared to the existing lock system, they have the problem of being opened by an electric shock. In this study, to improve safety, a method to hide the door-lock device inside and to display the door-lock on a user's smart-phone screen through the augmented reality is suggested. Furthermore, an additional function has been added which provides memo notes to facilitate communication among family members. The results of this study have been implemented by using motors to control locks, Wi-Fi shield, Arduino, and a virtually created door and showed desirable experimental results.

Towards Designing Efficient Lightweight Ciphers for Internet of Things

  • Tausif, Muhammad;Ferzund, Javed;Jabbar, Sohail;Shahzadi, Raheela
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.11 no.8
    • /
    • pp.4006-4024
    • /
    • 2017
  • Internet of Things (IoT) will transform our daily life by making different aspects of life smart like smart home, smart workplace, smart health and smart city etc. IoT is based on network of physical objects equipped with sensors and actuators that can gather and share data with other objects or humans. Secure communication is required for successful working of IoT. In this paper, a total of 13 lightweight cryptographic algorithms are evaluated based on their implementation results on 8-bit, 16-bit, and 32-bit microcontrollers and their appropriateness is examined for resource-constrained scenarios like IoT. These algorithms are analysed by dissecting them into their logical and structural elements. This paper tries to investigate the relationships between the structural elements of an algorithm and its performance. Association rule mining is used to find association patterns among the constituent elements of the selected ciphers and their performance. Interesting results are found on the type of element used to improve the cipher in terms of code size, RAM requirement and execution time. This paper will serve as a guideline for cryptographic designers to design improved ciphers for resource constrained environments like IoT.

Polymorphic Path Transferring for Secure Flow Delivery

  • Zhang, Rongbo;Li, Xin;Zhan, Yan
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.15 no.8
    • /
    • pp.2805-2826
    • /
    • 2021
  • In most cases, the routing policy of networks shows a preference for a static one-to-one mapping of communication pairs to routing paths, which offers adversaries a great advantage to conduct thorough reconnaissance and organize an effective attack in a stress-free manner. With the evolution of network intelligence, some flexible and adaptive routing policies have already proposed to intensify the network defender to turn the situation. Routing mutation is an effective strategy that can invalidate the unvarying nature of routing information that attackers have collected from exploiting the static configuration of the network. However, three constraints execute press on routing mutation deployment in practical: insufficient route mutation space, expensive control costs, and incompatibility. To enhance the availability of route mutation, we propose an OpenFlow-based route mutation technique called Polymorphic Path Transferring (PPT), which adopts a physical and virtual path segment mixed construction technique to enlarge the routing path space for elevating the security of communication. Based on the Markov Decision Process, with considering flows distribution in the network, the PPT adopts an evolution routing path scheduling algorithm with a segment path update strategy, which relieves the press on the overhead of control and incompatibility. Our analysis demonstrates that PPT can secure data delivery in the worst network environment while countering sophisticated attacks in an evasion-free manner (e.g., advanced persistent threat). Case study and experiment results show its effectiveness in proactively defending against targeted attacks and its advantage compared with previous route mutation methods.

A Study for the Innovativeness of Blockchain (블록체인 혁신성 연구)

  • Kim, Euiseok
    • The Journal of Society for e-Business Studies
    • /
    • v.23 no.3
    • /
    • pp.173-187
    • /
    • 2018
  • After Satoshi Nakamoto published 'Bitcoin: A peer-to-peer electronic cash system' in 2008, Blockchain has been GPT (General Purpose Technologies) that affect the whole cycle of the $4^{th}$ Industrial Revolution. This study attempted to identify the innovativeness of Blockchain. Because of Blockchain's ambidextrous characteristics, Blockchain has two kinds of innovativeness, technological innovation by physical technology and social innovation by social technology. Thus, this study will be useful to increase understanding and establishing strategy for Blockchain.

GROUP SECRET KEY GENERATION FOR 5G Networks

  • Allam, Ali M.
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.13 no.8
    • /
    • pp.4041-4059
    • /
    • 2019
  • Key establishment method based on channel reciprocity for time division duplex (TDD) system has earned a vital consideration in the majority of recent research. While most of the cellular systems rely on frequency division duplex (FDD) systems, especially the 5G network, which is not characterized by the channel reciprocity feature. This paper realizes the generation of a group secret key for multi-terminals communicated through a wireless network in FDD mode, by utilizing the nature of the physical layer for the wireless links between them. I consider a new group key generation approach, which using bitwise XOR with a modified pairwise secret key generation approach not based on the channel reciprocity feature. Precisely, this multi-node secret key agreement technique designed for three wireless network topologies: 1) the triangle topology, 2) the multi-terminal star topology, and 3) the multi-node chain topology. Three multi-node secret key agreement protocols suggest for these wireless communication topologies in FDD mode, respectively. I determine the upper bound for the generation rate of the secret key shared among multi-node, for the three multi-terminals topologies, and give numerical cases to expose the achievement of my offered technique.