• Title/Summary/Keyword: Security design

Search Result 3,411, Processing Time 0.035 seconds

The Design of a Biomedical Signal Measure System Based on Sensor Networks (센서 네트워크 기반의 생체 신호 측정 시스템 설계)

  • Lee, Jin-Kwan;Lee, Dae-Hyung;Jung, Kyu-Cheol;Jang, Hae-Suk;Lee, Jong-Chan;Park, Ki-Hong
    • Convergence Security Journal
    • /
    • v.7 no.1
    • /
    • pp.35-43
    • /
    • 2007
  • The object of this paper is to design a biomedical signal measure systems based on sensor networks for the patient, integrated with computing technology. Using a combination of zigbee RF, embedded hardware and software technologies, as it allows the healthcare center to receive the information on emergency situations and the ordinary state of the patients individually or simultaneously, the healthcare center can copy with quickly a state of emergency and assist the normal life of the patient. In order to meet the low power and other requirements for the proposed system, we introduce a zigbee based RP which is the most suitable solution for improving the performance of our beeper system.

  • PDF

A Design of Crypto-processor for Lightweight Block Cipher LEA (경량 블록암호 LEA용 암호/복호 프로세서 설계)

  • Sung, Mi-ji;Shin, Kyung-wook
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2015.05a
    • /
    • pp.401-403
    • /
    • 2015
  • This paper describes an efficient hardware design of 128-bit block cipher algorithm LEA(lightweight encryption algorithm). In order to achieve area-efficient and low-power implementation, round block and key scheduler block are optimized to share hardware resources for encryption and decryption. The key scheduler register is modified to reduce clock cycles required for key scheduling, which results in improved encryption/decryption performance. FPGA synthesis results of the LEA processor show that it has 2,364 slices, and the estimated performance for the master key of 128/192/256-bit at 113 MHz clock frequency is about 181/162/109 Mbps, respectively.

  • PDF

A Anonymous Authorization Scheme Based on ECC for RFID Privacy (RFID 프라이버시를 위한 ECC기반의 익명인증기법)

  • Jin, Shi-Mei;Li, Yong-Zhen;Lee, Sang-Ho;Rhee, Chung-Sei
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.33 no.3C
    • /
    • pp.293-298
    • /
    • 2008
  • Recently, with the development of mobile techniques and the consideration to conveniency of using, the research on Mobile RFID Reader technique is getting more and more attentions. Until now, all security authentication algorithms of RFID are algorithms about range between Tag and Reader. The range between Reader and backend DB is composed by wired networks, so it's supposed to be secure range. But it must be taken account of the problem of information security and privacy in wireless range during the design of Mobile RFID Reader. In this paper we design an blind signature scheme based on weil-paring finite group's ECC encryption scheme, and by using this blind signature we propose the anonymous authorization scheme to Mobile RFID Reader's users.

A Survey on Qualitative Analysis of Directional VANET MAC Protocols

  • Kim, Bongjae;Cho, Kwangsu;Nam, Choonsung
    • International Journal of Contents
    • /
    • v.10 no.2
    • /
    • pp.9-17
    • /
    • 2014
  • Since vehicles' trajectories are so complex and dense traffic changes in nature frequently, the VANET (Vehicles Ad-hoc Network), using Omni-directional Antenna, has many channel collisions (or overlapping) on Data Link phrases (MAC layers). It is not easy to keep a good seamless communication status for VANET because of its unpredictable network environment. Among VANET research, Directional Antenna have been proposed as one of the most common systematical solutions to reduce (or to mitigate) this miss-communication problems by narrowing communicational ranges and making use of its customized error-detection process. However, even though Directional Antennas help VANET keep good seamless communication, many VANET researchers have reported that Directional VANET still has miss-communicational problems - this has lead to problems like 'Directional Hidden Terminal Problem', 'Deafness', 'Un-accuracy Lobe Scopes' and 'High Deployment Cost' being reported in various papers. To establish well-organized design assessments for a good Directional VANET MAC protocol to overcome these problems, we rearranged and grouped current Directional VANET' qualitative criteria from several current survey papers using these categories- 'Directional Discovery', 'Directional Forwarding' and 'Directional Handover'. In addition, based on the results of the following analysis, we show the essential design concerns that need to be looked at in order to develop a well-designed Directional-VANET MAC protocol.

The Relationship between Physical Environment and Mental Health of the Urban and Rural Adolescents (도·농지역 청소년의 물리적 환경과 정신건강과의 관계)

  • Lee, Sunmin;Choi, Byungsook
    • Journal of the Korean housing association
    • /
    • v.25 no.3
    • /
    • pp.73-83
    • /
    • 2014
  • The purpose of this study is to identify the relationship between the physical environment and mental health of the adolescents in urban and rural areas. This study was performed using the questionnaire survey method. The research subjects were high school students in Seoul and Jeollabuk-do rural areas. The questionnaire inquired about the housing, neighborhood, and school environments, and these contents were depended on previous studies. The survey was conducted from August 27 to September 6, 2013, and 446 data were collected. They were analyzed with the SPSS 12.0 program. The main results are as follows. 1) The urban adolescents evaluated physical environment to be better than rural adolescents. Specifically, the urban adolescents evaluated 'facility/accommodation', 'security/health', 'amenity' of the housing environment, 'disorder', 'comfortability', 'nature awareness' of the neighborhood environment, and 'noise', 'overcrowding', and 'security' of the school environment to be higher. 2) The urban adolescents' self-esteem was significantly higher than rural ones. 3) The physical environment factors, which had effects on adolescents' mental health, are different depending on the areas, and so adolescents' physical environment would be designed by the local environment conditions.

Design and Implementation of IDS and Management Modules based on Network (네트워크 기반의 침입 탐지 시스템 관리 모듈 설계 및 구현)

  • 양동수;윤덕현;황현숙;정동호;김창수
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2001.05a
    • /
    • pp.680-683
    • /
    • 2001
  • As the rapid information communication technique, internet users have been continuously increasing every year, but on the other hand many damages have occurred on the internet because of dysfunction for computer system intrusion. To reduce damages, network and system security mechanism is variously developed by researcher, IDS(Intrusion Detection System) is commercialized to security technique. In this paper we describe for intrusion detection based on network, we design and implement IDS to detect illegal intrusion using misuse detection model. Implemented IDS can detect various intrusion types. When IDS detected illegal intrusion, we implemented for administrator to be possible management and control through mechanisms of alert message transmission, mail transmission, mail at the remote.

  • PDF

Design and Estimation of a Session Key based Access Control Scheme for Secure Communications in IoT Environments (IoT 환경에서 안전한 통신을 위한 세션 키 기반 접근 제어 기법의 설계 및 평가)

  • Jin, Byungwook;Jung, Dongwoog;Cha, Siho;Jun, Moonseog
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.12 no.1
    • /
    • pp.35-41
    • /
    • 2016
  • Internet of Things (IoT) services are widely used in appliances of daily life and industries. IoT services also provide various conveniences to users and are expected to affect value added of all industries and national competitiveness. However, a variety of security threats are increased in IoT environments and lowers reliability of IoT devices and services that make some obstacles for commercialization. The attacks arising in IoT environments are making industrial and normal life accidents unlike existing information leak and monetary damages, and can expand damage scale of leakage of personal information and privacy more than existing them. To solve these problems, we design a session key based access control scheme for secure communications in IoT environments. The proposed scheme reinforces message security by generating session key between device and access control network system. We analyzed the stability of the proposed access scheme in terms of data forgery and corruption, unauthorized access, information disclosure, privacy violations, and denial of service attacks. And we also evaluated the proposed scheme in terms of permission settings, privacy indemnity, data confidentiality and integrity, authentication, and access control.

MIPv6 Binding Update scheme to improve performance and security (성능과 보안성을 함께 개선한 MIPv6 바인딩 갱신)

  • Won, You-Seuk;Cho, Kyung-San
    • Journal of Internet Computing and Services
    • /
    • v.8 no.4
    • /
    • pp.81-91
    • /
    • 2007
  • Binding update for the routing optimization in MIPv6 can make the involved nodes vulnerable to various attacks. Therefore, secure binding update becomes an important research issue in MIPv6, and several protocols have been proposed for this purpose. In this paper, we compare several existing binding update protocols such as RR, SUCV and OMIPv6 and analyze the vulnerability of nodes to the possible attacks and drawbacks of address management and scalability and overhead of encryption operations. Then, we suggest the design requirements for the secure binding update and propose an advanced protocol based on the design principle. Through the analysis, we show that our protocol can achieve a higher level of security against the various attacks and enable better management of address, provide the location privacy and reduce the computational overhead of mobile nodes with constraint computational power.

  • PDF

Study on Design for Training Contents about Disaster Management - Design for Training Courses and Subjects Focus on Disaster Field Preparedness and Response - (방재부문 교육 컨텐츠 설계에 관한 연구 - 현장대비 및 대응 중심의 교육과정, 과목 설계 -)

  • Lee, Yong Jae;Nam, Sang Hoon;Lee, Young Jai
    • Journal of Korean Society of Disaster and Security
    • /
    • v.5 no.2
    • /
    • pp.11-20
    • /
    • 2012
  • Recently, inflicted damage for people's life and property from occurred major disaster that landslide by localized downpour and hydrofluoric acid leak from the Gumi. However public needs about safe society is more increasing from disaster because response is unsatisfactory on that. The purpose of this paper is that establish the core foundation for the education contents system of disaster management through cultivating expert. Therefore first, designed the training of course and subject by demand forecast. Next, designed the training course focus on preparedness and response at on-scene.

A Study on the Actuating Device Technology in Guided Weapon System (유도무기체계 구동장치 기술에 관한 연구)

  • Lee, Young-Uk
    • Convergence Security Journal
    • /
    • v.7 no.2
    • /
    • pp.145-154
    • /
    • 2007
  • In this paper, a study on the actuator device technology in guided weapon system development. Hydraulic and pressure, electric motor device had been mostly used, but recently due to high output to weight ratio, pressure actuator device is widely used except for small tactical guided ammunition which needed small power. And now the actuator design concept and technical level is changed because of high mobility of guided ammunition, development of magnetic materials which used new material for requirement of despondence, progress of control and electrodynamics technology, and digitalize and integrity. In this paper we clearly proposed the actuator design criteria and detailed technology development trend for next generation guided weapon system.

  • PDF