• 제목/요약/키워드: Security Objects

검색결과 371건 처리시간 0.022초

사물 인터넷망을 위한 RFID 보안 프레임워크와 프로토콜 분석 (Analyses of RFID Security Framework and Protocol Supporting Internet of Things)

  • 김정태
    • 한국정보통신학회:학술대회논문집
    • /
    • 한국정보통신학회 2014년도 추계학술대회
    • /
    • pp.373-374
    • /
    • 2014
  • Radio frequency identification system (RFID) is an automatic technology and aids machines or computers to identify objects, record metadata or control individual target through radio waves. Connecting RFID reader to the terminal of Internet, the readers can identify, track and monitor the objects attached with tags globally, automatically, and in real time, if needed. This is the so-called Internet of Things (IoT). RFID is often seen as a prerequisite for the IoT. This paper introduces amd surveyed the technologies of RFID and IoT, discusses the applications and challenges of RFID technology used in IoT.

  • PDF

사물 인터넷망에서의 RFID 응용 기술 및 보안 문제 분석 (Analyses of RFID Application and Its Security Problems Embedded in Internet of Things(IoT))

  • 김정태
    • 한국정보통신학회:학술대회논문집
    • /
    • 한국정보통신학회 2014년도 춘계학술대회
    • /
    • pp.473-474
    • /
    • 2014
  • Radio frequency identification system (RFID) is an automatic technology and aids machines or computers to identify objects, record metadata or control individual target through wireless waves. Connecting RFID reader to the terminal of Internet, the readers can identify, track and monitor the objects attached with tags globally, automatically, and in real time, if needed. This is the so-called Internet of Things (IOT). RFID is often seen as a prerequisite for the IOT. This paper surveys the technologies of RFID and IOT, discusses the applications and challenges of RFID technology used in IoT.

  • PDF

Internet of Things Fundamentals, Architectures, Challenges and Solutions: A Survey

  • Abdelhaq, Maha
    • International Journal of Computer Science & Network Security
    • /
    • 제22권1호
    • /
    • pp.189-198
    • /
    • 2022
  • As the number of people using the Internet increases, a new application known as the Internet of Things (IoT) has been emerged. Internet of Things makes it easier for machines and objects to exchange, compute, and coordinate information autonomously without human interference. It is a tool for attaching intelligence to a variety of contemporary objects in houses, hospitals, buildings, vehicles, and even cities. As a new emerging technology, the focus in current IoT surveys does not shed the light on deep understanding for IoT fundamentals, architectures, challenges, and solutions. For this reason, the objective of this paper is to introduce specifications for IoT definitions, characteristics, functional blocks, and different architectures as a cement for better understanding. Additionally, we present current documented IoT challenges, with the existing available solution for each challenge.

Evaluation of CPU And RAM Performance for Markerless Augmented Reality

  • Tagred A. Alkasmy;Rehab K. Qarout;Kaouther Laabidi
    • International Journal of Computer Science & Network Security
    • /
    • 제23권10호
    • /
    • pp.44-48
    • /
    • 2023
  • Augmented Reality (AR) is an emerging technology and a vibrant field, it has become common in application development, especially in smartphone applications (mobile phones). The AR technology has grown increasingly during the past decade in many fields. Therefore, it is necessary to determine the optimal approach to building the final product by evaluating the performance of each of them separately at a specific task. In this work we evaluated overall CPU and RAM performance for several types of Markerless Augmented Reality applications by using a multiple-objects in mobile development. The results obtained are show that the objects with fewer number of vertices performs steady and not oscillating. Object was superior to the rest of the others is sphere, which is performs better values when processed, its values closer to the minimum CPU and RAM usage.

분산 클러스터 기반 IoT 디바이스 경량 인증 방법에 대한 연구 (A Study on Light Weight Authentication Method of Distributed Cluster-based IoT Devices)

  • 김성환;김영곤
    • 한국인터넷방송통신학회논문지
    • /
    • 제19권2호
    • /
    • pp.103-109
    • /
    • 2019
  • ICT 기술이 발달로 인하여 주변에 존재하는 사물들을 네트워크로 연결하고, 사물에 대한 정보를 이용하여 다양한 분야에서 활용하기 위한 IoT 환경이 주목받고 있으며, 보안 위협 또한 증가하는 추세이다. IoT 환경에서 증가되는 보안 문제를 해결하기 위해 민간 분야에서 인증서, 암호화, 해쉬연산, 블록체인 등을 활용한 방법들을 연구하고 있으나, 디바이스 간의 성능 격차를 극복하고 다양한 장치에서 호환성을 가지는 보안인증 방식은 현재까지 구체화 되어 제안되고 있지 않은 상황이다. 본 논문에서는 IoT 장치 환경에 따른 영향을 최소화하여 호환성을 폭넓게 확보할 수 있는 인증 방식을 제안하고자 한다.

HOG를 이용한 다중객체 검출과 효과적인 개별객체 추적 (Multi-objects detection using HOG and effective individual object tracking)

  • 최민;이규원
    • 한국정보통신학회:학술대회논문집
    • /
    • 한국정보통신학회 2012년도 추계학술대회
    • /
    • pp.894-897
    • /
    • 2012
  • HOG(Histogram of Oriented Gradients)의 특징벡터를 이용하여 여러 객체가 움직이는 환경에서의 효과적인 개별객체 추적 방법을 제안한다. 알고리즘의 구성은 크게 영상의 전처리 과정, 객체검출, 객체추적으로 구성하였고, 다양한 궤적과 객체의 움직임을 갖는 6개의 동영상을 이용하여 실험하였다. 객체간에 겹치는 현상이 일어났을 때, 객체의 중심좌표와 예측좌표를 이용하여 개별 객체를 구분하였다. 제안한 시스템을 실험에 사용한 비디오에 적용한 결과 85.45%의 추적 성공률을 보였다. 제안한 시스템은 사물의 위치 및 움직임 패턴을 분석을 요하는 보안 시스템에 적용할 수 있을 것이다.

  • PDF

교량감시를 위한 센서 네트워크 보안프로토콜 (A Sensor Network Security Protocol for Monitoring the State of Bridge)

  • 임화정;전진순;이헌길
    • 산업기술연구
    • /
    • 제25권B호
    • /
    • pp.211-220
    • /
    • 2005
  • The wireless sensor network consists of a number of sensor nodes which have physical constraints. Each sensor node senses surrounding environments and sends the sensed information to Sink. The inherent vulnerability in security of the sensor nodes has promoted the needs for the lightweight security protocol. In this paper, we propose a non-hierarchical sensor network and a security protocol that is suitable for monitoring the man-made objects such as bridges. Furthermore, we present the efficient way of setting the routing path by storing IDs, MAC(message authentication code) and the location information of the nodes, and taking advantage of the two node states, Sleep and Awake. This also will result in the reduced energy consuming rate.

  • PDF

An Approach for Security Problems in Visual Surveillance Systems by Combining Multiple Sensors and Obstacle Detection

  • Teng, Zhu;Liu, Feng;Zhang, Baopeng;Kang, Dong-Joong
    • Journal of Electrical Engineering and Technology
    • /
    • 제10권3호
    • /
    • pp.1284-1292
    • /
    • 2015
  • As visual surveillance systems become more and more common in human lives, approaches based on these systems to solve security problems in practice are boosted, especially in railway applications. In this paper, we first propose a robust snag detection algorithm and then present a railway security system by using a combination of multiple sensors and the vision based snag detection algorithm. The system aims safety at several repeatedly occurred situations including slope protection, inspection of the falling-object from bridges, and the detection of snags and foreign objects on the rail. Experiments demonstrate that the snag detection is relatively robust and the system could guarantee the security of the railway through these real-time protections and detections.

A Review on IoT: Layered Architecture, Security Issues and Protocols

  • Tooba Rashid;Sumbal Mustafa
    • International Journal of Computer Science & Network Security
    • /
    • 제23권9호
    • /
    • pp.100-110
    • /
    • 2023
  • The Internet of Things (IoT) is the most creative and focused technology to be employed today. It increases the living conditions of both individuals and society. IoT offers the ability to recognize and incorporate physical devices across the globe through a single network by connecting different devices by using various technologies. As part of IoTs, significant questions are posed about access to computer and user privacy-related personal details. This article demonstrates the three-layer architecture composed of the sensor, routing, and implementation layer, respectively, by highlighting the security risks that can occur in various layers of an IoT architecture. The article also involves countermeasures and a convenient comparative analysis by discussing major attacks spanning from detectors to application. Furthermore, it deals with the basic protocols needed for IoT to establish a reliable connection between objects and items.

무선 환경에서 SSL/TLS를 사용하는 IoT의 에너지 효율성 향상을 위한 기법 (A Method to Improve Energy Efficiency for IoT Using SSL/TLS on Wireless Network)

  • 정진희;조대호
    • 정보보호학회논문지
    • /
    • 제26권3호
    • /
    • pp.661-666
    • /
    • 2016
  • 사물인터넷은 다양한 기기들이 서로 연결되어 효율적인 에너지 소모와 높은 보안을 유지하기 위해 경량의 메시징 프로토콜인 MQTT와 암호화 프로토콜인 SSL/TLS를 사용한다. SSL/TLS의 cipher suite 협상 단계에서 기기에 고정된 cipher suites로부터 선호도가 가장 높은 cipher suite를 선택한다. 선택된 cipher suite는 해당 통신 중에 필수적으로 제공받아야 하는 무결성, 기밀성을 제공하지만 필요 이상으로 높은 강도의 보안성을 제공할 수 있다. 이러한 한계는 에너지를 필요 이상으로 소비하게 만들 수 있으므로 본 논문에서는 SSL/TLS를 사용한 기기들의 에너지 효율성을 향상시키는 퍼지 기반 cipher suite 결정 기법을 제안한다. 실험을 통해 제안 기법은 기존 기법보다 에너지 효율성이 평균 36.03% 향상되었다.