• Title/Summary/Keyword: Security design

Search Result 3,411, Processing Time 0.031 seconds

Research on the Direction of Building an Integrated Smart Platform at Construction Sites (건설현장 통합 스마트플랫폼 구축방향에 대한 연구)

  • Yeon Cheol Shin;Yu Mi Moon
    • Journal of the Society of Disaster Information
    • /
    • v.20 no.3
    • /
    • pp.620-634
    • /
    • 2024
  • Purpose: This study aims to strengthen the linkage between the construction site and the headquarters, suggest the direction of building an integrated smart platform that can actually be operated and utilized in the field, and effectively implement safety management. Method: Agile methodologies were applied to build a flexible and scalable system through cloud-based and three-tier architectures. Functional requirements were set through an on-site survey, and design and construction were carried out by reflecting personal information protection and legal requirements. Result: The integrated smart platform proposed in this study strengthens the connection between the site and the headquarters to maximize the effect of safety accident prevention and safety management. This system has improved the safety awareness of workers and managers, and has realized more efficient safety management through a unified communication system. Conclusion: In the establishment of an integrated smart platform, it is essential to reflect the characteristics of the site when selecting the development method and establishing the function plan. In the basic design and detailed design stages, it is necessary to establish security measures, design mobile functions, and review device expansion, and consider enterprise-wide safety management, user convenience, and scalability. It is also important to maintain and improve the system, reflect legal requirements, and support the elderly and foreign workers. By strengthening personal information and CCTV security and continuously improving it by reflecting user opinions, it can be expected to activate an integrated smart platform.

Research about muscle ache curer design development for hospital (병원용 근육통증 치료기 디자인 개발에 관한 연구)

  • Oh, Sung-Jin
    • Proceedings of the Korea Contents Association Conference
    • /
    • 2006.11a
    • /
    • pp.856-859
    • /
    • 2006
  • Patient's position who muscle ache curer for hospital undergoes person entrance and treatment that take advantage of biological, physical force of low frequency and it is equipment that treat body muscle ache, but use equipment when use patient into compensation in hospital specially, that consider everybody is important first of all. This research question investigation with market survey of old product enforce because preference degree reflected officer a result and apply opinion tuned with product development connection engineers on DESIGN direction via typical product design development process close. This curer development research analyzed data involved directly taking advantage of FGI techniques with literature investigation collection. Investigation examined laying stress on muscle ache curer for hospital and a nurse than a doctor answered on question and purchase selection criterion or price portion to user focus. Direct market survey research that see item indicated by competition four provision shortcomings consequently in NEW MODEL development hereafter supplement and expectation. by contributing greatly in M/S security strategy hereafter because design development consisted for side that improve.

  • PDF

Low Power Cryptographic Design based on Circuit Size Reduction (회로 크기 축소를 기반으로 하는 저 전력 암호 설계)

  • You, Young-Gap;Kim, Seung-Youl;Kim, Yong-Dae;Park, Jin-Sub
    • The Journal of the Korea Contents Association
    • /
    • v.7 no.2
    • /
    • pp.92-99
    • /
    • 2007
  • This paper presented a low power design of a 32bit block cypher processor reduced from the original 128bit architecture. The primary purpose of this research is to evaluate physical implementation results rather than theoretical aspects. The data path and diffusion function of the processor were reduced to accommodate the smaller hardware size. As a running example demonstrating the design approach, we employed a modified ARIA algorithm having four S-boxes. The proposed 32bit ARIA processor comprises 13,893 gates which is 68.25% smaller than the original 128bit structure. The design was synthesized and verified based on the standard cell library of the MagnaChip's 0.35um CMOS Process. A transistor level power simulation shows that the power consumption of the proposed processor reduced to 61.4mW, which is 9.7% of the original 128bit design. The low power design of the block cypher Processor would be essential for improving security of battery-less wireless sensor networks or RFID.

A Study on Architectural Results and Specific Characters of according to an Agreement Method in Housing Complex Plan - Focused on the Bong Mu-dong Town House in Daegu (집합주택계획에서 협의방식을 통해 나타난 건축적 성과와 특성에 관한 연구 - 대구광역시 '봉무동 타운하우스'를 중심으로 -)

  • Lee Jeong-Ho;Yoon Young Do
    • Journal of the Korean housing association
    • /
    • v.17 no.1
    • /
    • pp.145-153
    • /
    • 2006
  • Making of agreement with participation subjects is important process laying stress on presentation and a reasonable design guide line to form space order grant and synthetic space in Housing Complex plan. This study analyzed residing application specific character of design guide line that is presented to architects in general planning laying stress on plan only of 'Bongmu-dong town house' and design agreement of by architectural result that appear analyze. Result that analyze is as following: 1) Confer in 18 plan contents and integrate design or was adjusted. Being main conduct and unit plan and residing only in plan many negotiations accomplish. Architect who confer most Designs of 5 architects is 'Jean Michel Wilmott' and 'Shigeru Ban' 2) contents that confer much in plan main conduct and unit generation were details plan. Contents that is conferred with many architects are about door/core/rooftop be and asked a question about proper size of entrance. Negotiation about size was expose to the tribe of knowledge about element that do furniture and detail of necessary each space in life style of our country. We must present furnitures or detail element that appear by emotion of our country and detailed item of furnitures' size etc.. in guide line. It is immediate that creation of guide that architects can approach easily for lacking abroad architects of interests by code difference in each country is pressing. 3) In residing plan 4 architects of 5 architects applied similarly guide line in design. Most architects look by active support that make synthetic housing complex. and this is construed that act positively to make by unified residing. That plan of woods or landscape architecture and security of green area space are thing to approach on 'Environment-friendly mode of life residing only' that is general planning subject of 'Bongmu-dong town house'. 4) common question items of architects guide line of though is refered definitely when make out effective interests plan. So that can overcome legislation difference, countermeasure to make understood construction code of our country is pressing

A Design Communication System for Message Protection in Next Generation Wireless Network Environment (차세대 무선 네트워크 환경에서 메시지 보호를 위한 통신 시스템 설계)

  • Min, So-Yeon;Jin, Byung-Wook
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.16 no.7
    • /
    • pp.4884-4890
    • /
    • 2015
  • These days most of people possesses an average of one to two mobile devices in the world and a wireless network market is gradually expanding. Wi-Fi preference are increasing in accordance with the use growth of mobile devices. A number of areas such as public agencies, health care, education, learning, and content, manufacturing, retail create new values based on Wi-Fi, and the global network is built and provides complex services. However, There exist some attacks and vulnerabilities like wireless radio device identifier vulnerability, illegal use of network resources through the MAC forgery, wireless authentication key cracking, unauthorized AP / devices attack in the next generation radio network environment. In addition, advanced security technology research, such as authentication Advancement and high-speed secure connection is not nearly progress. Therefore, this paper designed a secure communication system for message protection in next-generation wireless network environments by device identification and, designing content classification and storage protocols. The proposed protocol analyzed safeties with respect to the occurring vulnerability and the securities by comparing and analyzing the existing password techniques in the existing wireless network environment. It is slower 0.72 times than existing cypher system, WPA2-PSK, but enforces the stability in security side.

A Study on Security Level-based Authentication for Supporting Multiple Objects in RFID Systems (다중 객체 지원을 위한 RFID 시스템에서 보안 레벨 기반의 인증 기법에 관한 연구)

  • Kim, Ji-Yeon;Jung, Jong-Jin;Jo, Geun-Sik;Lee, Kyoon-Ha
    • The Journal of Society for e-Business Studies
    • /
    • v.13 no.1
    • /
    • pp.21-32
    • /
    • 2008
  • RFID systems provide technologies of automatic object identification through wireless communications in invisible ranges and adaptability against various circumstances. These advantages make RFID systems to be applied in various fields of industries and individual life. However, it is difficult to use tags with distinction as tags are increasingly used in life because a tag usually stores only one object identifier in common RFID applications. In addition, RFID systems often make serious violation of privacy caused by various attacks because of their weakness of radio frequency communication. Therefore, information sharing methods among applications are necessary for expansive development of RFID systems. In this paper, we propose efficient RFID scheme. At first, we design a new RFID tag structure which supports many object identifiers of different applications in a tag and allows those applications to access them simultaneously. Secondly, we propose an authentication protocol to support the proposed tag structure. The proposed protocol is designed by considering of robustness against various attacks in low cost RFID systems. Especially, the proposed protocol is focused on efficiency of authentication procedure by considering security levels of applications. In the proposed protocol, each application goes through one of different authentication procedures according to their security levels. Finally, we prove efficiency of th proposed scheme compared with the other schemes through experiments and evaluation.

  • PDF

IoT Security Channel Design Using a Chaotic System Synchronized by Key Value (키값 동기된 혼돈계를 이용한 IoT의 보안채널 설계)

  • Yim, Geo-Su
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.15 no.5
    • /
    • pp.981-986
    • /
    • 2020
  • The Internet of Things refers to a space-of-things connection network configured to allow things with built-in sensors and communication functions to interact with people and other things, regardless of the restriction of place or time.IoT is a network developed for the purpose of services for human convenience, but the scope of its use is expanding across industries such as power transmission, energy management, and factory automation. However, the communication protocol of IoT, MQTT, is a lightweight message transmission protocol based on the push technology and has a security vulnerability, and this suggests that there are risks such as personal information infringement or industrial information leakage. To solve this problem, we designed a synchronous MQTT security channel that creates a secure channel by using the characteristic that different chaotic dynamical systems are synchronized with arbitrary values in the lightweight message transmission MQTT protocol. The communication channel we designed is a method of transmitting information to the noise channel by using characteristics such as random number similarity of chaotic signals, sensitivity to initial value, and reproducibility of signals. The encryption method synchronized with the proposed key value is a method optimized for the lightweight message transmission protocol, and if applied to the MQTT of IoT, it is believed to be effective in creating a secure channel.

Design of an RFID Communication Protocol Using Synchronized Chaotic Systems (동기화된 혼돈시스템을 이용한 RFID 통신 프로토콜 설계)

  • Yim, Geo-Su
    • The Journal of Korea Institute of Information, Electronics, and Communication Technology
    • /
    • v.9 no.5
    • /
    • pp.451-457
    • /
    • 2016
  • To improve security in the data communication field, many studies on the application of chaotic signals to encryption have been conducted in recent years. In this study, a new security protocol where the initial value sensitivity and noise similarity of chaotic signals have been applied to an RFID communication channel was designed. In the case of chaotic systems, if the initial values become identical, the same signals are generated at the same time after that point even though the two systems have been calculated independently. Therefore, an unpredictable security channel can be produced based on such characteristics. However, a security channel can be produced only when an initial value is shared in advance, and thus there is a potential problem of infringement during the transmission of the initial value. To resolve this problem, a method in which a certain proportion of new chaotic signals are applied to two chaotic systems for communication and are then synchronized after some time was proposed. This new method can conceal the initial value, and thus can resolve the problem of the existing communication method using chaotic signals. The designed method was verified with the encryption and decryption of images. It is expected that a more secure RFID system could be established by applying the communication protocol proposed in this study to insecure RFID communication channels.

Design and Analysis of Data File Protection based on the Stream Cipher (데이터파일의 보호를 위한 스트림 암호방식 설계와 해석)

  • 이경원;이중한;김정호;오창석
    • The Journal of the Korea Contents Association
    • /
    • v.4 no.1
    • /
    • pp.55-66
    • /
    • 2004
  • Recently, as the personal computers are supplied rapidly, they formed the nucleus of the computer system. But, because of the easiness that anyone uses them to go near easily, it is the fact that the security of personal computer is weakness. So, in the paper, 1 propose the technical method that minimizes the loss and leakage of important data. This paper implemented a crypto system for security of data file on personal computer and assistance storage medium. The way of encryption/decryption is applied by complexity method which mixed Diffie-Hellman key exchange protocol, a typical RC4(Rivest Cipher version 4) algorithm of stream cipher and a typical MD5(Message Digest version 5) of Hash Function. For valuation implemented crypto system, three criteria is presented, which are crypto complexity, processing time and pattern matching. And according to analysis the three criteria the crypto system is verified the security, efficiency and usefulness. The crypto system is programmed with Visual C++ language of Microsoft. And so, as this is software system, we shall have a technical security system at a minimum cost for all personal computer.

  • PDF

A Study on User's Acceptance of Blockchain-based Copyright Distribution Platforms and Its Usage (소비자의 블록체인 기반 저작권 유통 플랫폼 수용의도와 이용행위에 관한 연구)

  • Yoo, Young-Hwan;Park, Hyeon-Suk
    • The Journal of Industrial Distribution & Business
    • /
    • v.10 no.3
    • /
    • pp.59-72
    • /
    • 2019
  • Purpose - Blockchain technology, which has the characteristics of credibility, security, integrity and decentralization, has brought innovation to internet platforms that mediate peer to peer transactions, as well as changes to the contents distribution services. Blockchain-based copyright distribution platforms can solve problems which have been articulated on prior internet social networks: increased market dominance of platform business because of centralization with no reward to creators who upload on platforms, and lack of fairness, such as unfair profit distribution between the copyright holder and businesses. With this background, the current research confirmed the factors that affect the intention of usage and behaviors, targeting potential users of blockchain-based copyright distribution platforms. Research design, data, and methodology - Centered around the UTAUT2 Model, the research model was designed with 'Perceived Security' added as Construct, and 'Age' and 'Knowledge Level' added as moderating variables. For data, 607 responses were collected by an online survey, and 601 responses were included in the final analysis. We analyzed the research model and sample by using SPSS 23.0 and AMOS 23.0 on the collected responses. Results - First, results of research on whether Constructs make positive effects on Intention of use is: social influence, facilitating conditions, habit, and perceived security had positive effects on intention of use, and performance expectancy, effort expectancy, hedonic motivation, and economic value did not. Second, results of the research on whether facilitating condition, habit, and intention of use made an impact on using behaviors, it was shown that only habit and intention of use made positive effects. Third, in two groups divided by age above or under 40, group effort expectancy, intention of use, habit, and intention of use had controlling effects, and facilitating condition, intention of use, perceived security, and intention of use had effects in both groups. Conclusions - The research shows that no matter how great a blockchain-based platform is, if advantages of blockchain are not proved in various industries and utilized in real life like the internet, blockchain-based distribution systems will develop slowly. Rather than a short-term inducement emphasizing technology, there is a need for a strategic approach that can foster the environment.