• Title/Summary/Keyword: Security and Safety

Search Result 2,168, Processing Time 0.026 seconds

Evaluation Criteria of the Walkway Level-of-Service in Korea (국내 보행 서비스수준의 평가기준)

  • 김경환
    • Journal of Korean Society of Transportation
    • /
    • v.17 no.3
    • /
    • pp.31-46
    • /
    • 1999
  • In the middle of motorization, the traffic problems become serious social problems in Korea. The walking environment is not only a topic which restores the community spirit of a city or society but also a lever which renovates the future space of the city environment-friendly. Thus, the Purpose of this study is to suggest the new criteria of walkway level of service adopting the concepts of safety. convenience, comfort, environment, security, and continuity in addition to present pedestrian flow rate, and to provide basic data for walkway plan in Korea. In order to analyze the adequacy of the present walkway level of service criteria, the walkways of which service levels were A, C, E according to USHCM were selected as study walkways, and an interview surrey was conducted to compare the three service levels with those that pedestrians evaluate actually. Also, another interview survey was conducted to analyze the service conditions and satisfaction level at the walkways of high service levels(A and B). For the establishment of more reasonable walkway level of service criteria. the survey of pedestrian\`s consciousness for walkway service was conducted. Based on the survey results, the new criteria for the evaluation of walkway service were selected and the six levels of service for each criterion was analyzed: so the comprehensive criteria of walkway level of service were suggested.

  • PDF

A Cluster-based Efficient Key Management Protocol for Wireless Sensor Networks (무선 센서 네트워크를 위한 클러스터 기반의 효율적 키 관리 프로토콜)

  • Jeong, Yoon-Su;Hwang, Yoon-Cheol;Lee, Keon-Myung;Lee, Sang-Ho
    • Journal of KIISE:Information Networking
    • /
    • v.33 no.2
    • /
    • pp.131-138
    • /
    • 2006
  • To achieve security in wireless sensor networks(WSN), it is important to be able to encrypt and authenticate messages sent among sensor nodes. Due to resource constraints, many key agreement schemes used in general networks such as Diffie-Hellman and public-key based schemes are not suitable for wireless sensor networks. The current pre-distribution of secret keys uses q-composite random key and it randomly allocates keys. But there exists high probability not to be public-key among sensor nodes and it is not efficient to find public-key because of the problem for time and energy consumption. To remove problems in pre-distribution of secret keys, we propose a new cryptographic key management protocol, which is based on the clustering scheme but does not depend on probabilistic key. The protocol can increase efficiency to manage keys because, before distributing keys in bootstrap, using public-key shared among nodes can remove processes to send or to receive key among sensors. Also, to find outcompromised nodes safely on network, it selves safety problem by applying a function of lightweight attack-detection mechanism.

A Study on Integrated ID Authentication Protocol for Web User (웹 사용자를 위한 통합 ID 인증 프로토콜에 관한 연구)

  • Shin, Seung-Soo;Han, Kun-Hee
    • Journal of Digital Convergence
    • /
    • v.13 no.7
    • /
    • pp.197-205
    • /
    • 2015
  • Existing Web authentication method utilizes the resident registration number by credit rating agencies separating i-PIN authentication method which has been improved authentication using resident registration number via the real name confirmation database. By improving the existing authentication method, and it provides the available integrated ID authentication on Web. In order to enhance safety, the proposed authentication method by encrypting the user of the verification value, and stores the unique identifier in the database of the certificate authority. Then, the password required to log in to the Web is for receiving a disposable random from the certificate authority, the user does not need to remember a separate password and receives the random number by using the smart phone. It does not save the user's personal information in the database, and it is easy to management of personal information. Only the integration ID needs to be remembered with random number on every time. It doesn't need to use various IDs and passwords if you use this proposed authentication methods.

A Study on the Necessity of Limitation for Legal Liability in Marine Accidents (해양사고에 있어서 책임귀속의 제한 필요성에 관한 연구)

  • Ji, Sang-Won
    • Journal of Navigation and Port Research
    • /
    • v.34 no.3
    • /
    • pp.251-255
    • /
    • 2010
  • A marine accident is caused various legal liability such as compensation for damages on civil law, responsibility on the Criminal Code and administrative sanctions. The results occurred by any acts is not connected directly to the legal responsibility. As a prior condition for these legal liabilities, it is required the causation between the act caused and the occurrence of the effect. It is very difficult to find out the cause in marine accidents, because of trouble of a proof security, the place occurred, time difference between accident and investigation point of time etc.. However, finding out the correct cause is an element important to prevent similar accident and to determine the liability reverted. The logical concept of the causation is not limited, but there is early necessity to limit it in the liability reverted. Therefore, this study aims to suggest reasonable standard to determine liability reverted in marine accidents.

A Preference Analysis for Internet of Things based Mobile Telecom Environment in Korea (국내 이동통신 사물인터넷에 관한 선호도 분석)

  • Nam, Soo-Tai;Jin, Chan-Yong
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2017.05a
    • /
    • pp.140-143
    • /
    • 2017
  • Lately, the three mobile telecom companies in Korea are competing for the launch of internet of things services for using home. Typical launched services are in the smart home related fields. However, internet of things as mobile telecom based are at an early stage, expected that various services will be started continuously. At this point, we have been planning to analyze the preference of Internet of things for objects based on the services already launched. In order to apply the AHP (analytic hierarchy process) analysis method, the first stage factors were designed as safety, security, health care, intelligence and home appliances. In addition, the second stage factors were organized into 18 detailed services presented in the conceptual model. Thus, we present the theoretical and practical implications of these results.

  • PDF

Monitoring System for the Elderly Living Alone Using the RaspberryPi Sensor (라즈베리파이 센서를 활용한 독거노인 모니터링 시스템)

  • Lee, Sung-Hoon;Lee, June-Yeop;Kim, Jung-Sook
    • Journal of Digital Contents Society
    • /
    • v.18 no.8
    • /
    • pp.1661-1669
    • /
    • 2017
  • In 2017, Korea has reached 1.3 million elderly people living alone. The government is promoting the basic care service for the elderly by using care workers to check the security of the elderly living alone. However, due to lack of service personnel and service usage rate of elderly care workers, it is difficult to manage. To improve these environmental constraints, this study attempted to construct a monitoring system for elderly people living alone by using sensors such as temperature, humidity, motion detection, and gas leak detection. The sensor periodically collects the current status data of the elderly and sends them to the server, creates a real time graph based on the data, and monitors it through the web. In the monitoring process, when the sensor is out of the range of the specified value, it sends a warning text message to the guardian to inform the current situation, and is designed and implemented so as to support the safety life of the elderly living alone.

Implementation of Secure Keypads based on Tetris-Form Protection for Touch Position in the Fintech (핀테크에서 터치 위치 차단을 위한 테트리스 모양의 보안 키패드의 구현)

  • Mun, Hyung-Jin;Kang, Sin-Young;Shin, ChwaCheol
    • Journal of Convergence for Information Technology
    • /
    • v.10 no.8
    • /
    • pp.144-151
    • /
    • 2020
  • User-authentication process is necessary in Fintech Service. Especially, authentication on smartphones are carried out through PIN which is inputted through virtual keypads on touch screen. Attacker can analogize password by watching touched letter and position over the shoulder or using high definition cameras. To prevent password spill, various research of virtual keypad techniques are ongoing. It is hard to design secure keypad which assures safety by fluctuative keypad and enhance convenience at once. Also, to reconfirm user whether password is wrongly pressed, the inputted information is shown on screen. This makes the password easily exposed through high definition cameras or Google Class during recording. This research analyzed QWERTY based secure keypad's merits and demerits. And through these features, creating Tetris shaped keypad and piece them together on Android environment, and showing inputted words as Tetris shape to users through smart-screen is suggested for the ways to prevent password spill by recording.

IoT model to improve parent-child interaction -Focus on smart watch for kids- (부모-자녀 상호작용을 증진하는 IoT 모델 -유아용 스마트워치를 중심으로-)

  • Yee, Young-Hwan
    • Journal of Convergence for Information Technology
    • /
    • v.7 no.6
    • /
    • pp.209-218
    • /
    • 2017
  • To propose a contents model for children's smart watch, this study interview 15mothers who have a child using smart watches. Most mothers purchase smart watches for children to warrant their security and manage their schedules, and they use them for sending a call or text to their children, tracking or managing children's location and schedule. Mothers were satisfied with a smart watch's function of communication and safety management, but dissatisfied learning-oriented contents and worrried about bad influenced on children development. Through in-depth interviews, this study propose a persona model for children's smart watch for enhancing parent-child interaction and physical cognitive language socioemotional convergence play contents.

A Study on Korean Seafarer's Perceptions Towards Unmanned Ships (무인화 선박에 대한 한국 선원들의 인식에 관한 연구)

  • D'agostini, Enrico;Ryoo, Dong-Keun;Jo, So-Hyun
    • Journal of Navigation and Port Research
    • /
    • v.41 no.6
    • /
    • pp.381-388
    • /
    • 2017
  • Recently, renewed attention for technological applications within the maritime industry has taken place, particularly regarding unmanned vessels. There has been a lot of interest about the number of projects aiming at testing the operational feasibility of unmanned vessels, particularly in relation to technological, safety and security issues. Nevertheless, no studies have investigated this issue from the point of view of seafarers towards unmanned vessels; this paper aims at filling this gap. Data has been collected through a survey questionnaire. A Pearson correlational coefficient has been used to test the correlation between some of the variables. The results show that more than half of the respondents indicated that unmanned vessels do not contribute to an increase in accidents at sea. In addition, seafarers believe unmanned vessels will not be operational in the near future, with most of the respondents indicating a 10-20 year time frame. Thirdly, most of the respondents(both officers and ratings).

Development of Secure Entrance System using AOP and Design Pattern (관점지향 소프트웨어 개발 방법론과 디자인 패턴을 적용한 출입 보안 시스템 개발)

  • Kim, Tae-Ho;Cheon, Hyeon-Jae;Lee, Hong-Chul
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.11 no.3
    • /
    • pp.943-950
    • /
    • 2010
  • A secure entrance system is complicated because it should have various functions like monitoring, logging, tracing, authentication, authorization, staff locating, managing staff enter-and-leave, and gate control. In this paper, we built and applied a secure entrance system for a domestic nuclear plant using Aspect Oriented Programming(AOP) and design pattern. Using AOP has an advantage of clearly distinguishing the role for each functional module because building a system separated independently from the system's business logic and security logic is possible. It can manage system alternation flexibility by frequent change of external environment, building a more flexible system based on increased code reuse, efficient functioning is possible which is an original advantage of AOP. Using design pattern enables to design by structuring the complicated problems that arise in general software development. Therefore, the safety of the system can also be guaranteed.