• Title/Summary/Keyword: Security design

Search Result 3,411, Processing Time 0.035 seconds

Implementation of Smart Control System based on Intelligent Dimming with LEDs

  • Lee, Geum-Boon
    • Journal of the Korea Society of Computer and Information
    • /
    • v.21 no.5
    • /
    • pp.127-133
    • /
    • 2016
  • In this paper, an intelligent dimming control system is designed and implemented with the human visual response function using CDS sensor, PIR sensor and temperature sensor, etc. The proposed system is designed to detect a moving object by PIR sensor and to control the LED dimming considering the human visual response. Also, the dimming of LED light can modulate on the app, and simultaneously control dimming in real-world environments with smart phone app. A high-temperature warning or a fire hazard information is transmitted to user's smart phone according to sensor values and Data graph are provided as part of data visualization. Connecting the hardware controller, the proposed intelligent smart dimming control system is expected to contribute to the power reduction interior LED, smart grid building and saving home combining with internet of things.

Secure Private Key Revocation Scheme in Anonymous Cluster -Based MANETs

  • Park, YoHan;Park, YoungHo
    • Journal of Korea Multimedia Society
    • /
    • v.18 no.4
    • /
    • pp.499-505
    • /
    • 2015
  • Security supports are a significant factor in the design of mobile ad hoc networks. In the dynamic topology where the node changes frequently, private key generation and revocation for newly joining and leaving nodes must be considered. In addition, the identities of individual nodes must be protected as well in mobile networks to avoid personal privacy concerns. This paper proposes ID-based private key revocation scheme and non-interactive key agreement scheme in anonymous MANETs. The proposed scheme provides the user privacy using pseudonyms and private key generation and revocation schemes with consideration of dynamic user changes. Therefore, our schemes can be applied in dynamic and privacy-preserving MANETs which are helpful to share multimedia data.

Design of the Secure and Efficient Library Circulation System based on Moblie RFID (모바일 RFID 기반의 안전하고 효율적인 도서대출시스템 설계)

  • Jang, Seon-Ju;Kim, Kyu-Seok
    • Proceedings of the Korean Society of Computer Information Conference
    • /
    • 2013.01a
    • /
    • pp.233-236
    • /
    • 2013
  • 현대사회가 언제 어디서나 정보를 주고 받는 유비쿼터스 사회로 변화하면서 센싱기술, 통신기술, 서비스 기술 등을 이용하여 우리가 볼 수 있는 모든 사물을 사람과 통신 가능하게 해주는 IoT기술이 부각되고 있다. IoT는 일반적으로 사람의 관여 없이 사물 간에 이루어지는 통신을 뜻하는 것으로 국내에선 개념적으로 USN기술과 흡사하다. 본 논문에서는 USN 분야 중 하나인 모바일 RFID 기술을 이용한 도서 대출 시스템을 제안하고 무선으로 정보를 주고 받는 모바일 RFID의 특성을 고려하여 태그와 리더 간의 인증 프로토콜을 제시한다.

  • PDF

Re-Ordering of Users in the Group Key Generation Tree Protocol (사용자 순서 재조정을 통한 그룹 키 생성 트리 프로토콜)

  • Hong, Sung-Hyuck
    • Journal of Digital Convergence
    • /
    • v.10 no.6
    • /
    • pp.247-251
    • /
    • 2012
  • Tree-based Group Diffie-Hellman (TGDH) is one of the efficient group key agreement protocols to generate the GK. TGDH assumes all members have an equal computing power. As one of the characteristics of distributed computing is heterogeneity, the member can be at a workstation, a laptop or even a mobile computer. Therefore, the group member sequence should be reordered in terms of the member's computing power to improve performance. This research proposes a reordering of members in the group key generation tree to enhance the efficiency of the group key generation.

Design of JavaCard with enhanced Public Key Cryptograhy and Its performance Evaluation (비대칭키 암호 알고리즘을 고속으로 수행하는 자바카드 구현 및 성능 평가)

  • 김호원;최용재;김무섭;박영수
    • Proceedings of the IEEK Conference
    • /
    • 2001.06c
    • /
    • pp.55-58
    • /
    • 2001
  • In this paper, we present the development of a JavaCard for public key crypto algorithms and its performance evaluation. To make a high performance for the public key crypto algorithm such as RSA and ECC on a JavaCard, we have implemented a crypto coprocessor in hardware and ported it to the card operating system and virtual machine environments. The performance of the public key crypto algorithms on the JavaCard shows that our JavaCard is suitable for If card applications which needs high performance and high level of security.

  • PDF

Covert Channel Based on Instruction Gadgets in Smart Sensing Devices

  • Ho, Jun-Won
    • International journal of advanced smart convergence
    • /
    • v.6 no.4
    • /
    • pp.56-59
    • /
    • 2017
  • In this paper, we design a covert channel based on instruction gadgets in smart sensing devices. Unlike the existing convert channels that usually utilize diverse physical characteristics or user behaviors or sensory data of smart sensing devices, we show that instruction gadgets could be exploited for covert channel establishment in smart sensing devices. In our devised covert channels, trojan smart sensing devices exchange attack packets in such a way that they encode an attack bit in attack packet to a series of addresses of instruction gadgets and decode an attack bit from a series of addresses of instruction gadgets.

Architectural Characteristics of Hot Spring in Rural Korea (온천건축의 특징에 관한 고찰 -농촌지역을 중심으로-)

  • Jeong, Jong-Tae;Choi, Man-Jin
    • Journal of Agricultural Extension & Community Development
    • /
    • v.18 no.2
    • /
    • pp.281-313
    • /
    • 2011
  • 67.82% of domestic hot springs are in rural areas. (Ministry of Public Administration and Security statistics, 2010) Most of hot spring's facilities are aging and inability to accommodate the current changes of leisure patterns. So, a decrease of the number of visitor to the hot spring resulted in economic decline of rural areas. Hot spring has been studied, but Architecture of Hot Springs has never been interested in and research. Therefore, Nation architecture of Hot spring and foreign architecture was compared and analyzed. Then, Architectural characteristics of Hot spring in rural areas was identify. The architecture of Hot spring type of foreign and images are routinely burned, the organic form and old-fashioned adrift. However, our country found in Hot spring architecturally and daily life had any features. Thus, the country's hot springs spa area for construction of the architecture design should be characterized. And, through institutional guidelines and deliberations should be provided in the right direction.

A Study on Change of Logistics Environment in Northeast Asia and Logistics Hub Strategy of China

  • Oh, Moon-Kap
    • Journal of Distribution Science
    • /
    • v.14 no.1
    • /
    • pp.59-66
    • /
    • 2016
  • Purpose - The purpose of this study is to find out how shipping company recognizes making partnership with the third party logistics provider and to give implication. Research design, data and methodology - Personal interview and questionnaire by E-mail, Fax, Mail, and telephone were used. 700 copies of the questionnaires were distributed and 155 copied were returned. Among collected questionnaires, 20 copies were excluded because of insufficient content, and therefore 135 copies were used. Results - Korea should change into new paradigm from old one based on current economic and social systems which has stemmed from bureaucracy, inflexibility chauvinism and equalitarianism. Flexible policies, administration and systems will be needed for better business practices. The Domestic logistics corporation needs to preoccupy strategic logistics hub and network. Conclusions - To be a center of North East Logistics, Korea needs more reasonable business law, systems and policies. Social norms and orders should be established to accomplish political and social security. A paradigm of the policy ruling over development of capital city and satellite cities shall make change.

Session Key Recovery of IPSec using PKI (공개키를 이용한 IPSec 프로토콜 세션키의 복구)

  • Rhee, Yoon-Jung
    • Proceedings of the Korea Contents Association Conference
    • /
    • 2006.11a
    • /
    • pp.622-625
    • /
    • 2006
  • The basic observation of the present paper is that cryptographic solutions that have been proposed so far completely ignore the communication context. IPSec is a security protocol suite that provides encryption and authentication services for IP messages at the network layer of the Internet. We propose example to provide key recovery capability by adding key recovery information to an IP datagram. It is possible to take advantage of the communication environment in order to design key recovery protocols that are better suited and more efficient.

  • PDF

Design and Implementation of Combination Module between GIS and URL Information (GIS와 URL정보 연동 모듈 설계 및 구현)

  • Lee Jin-Wook;Jang Se-Hyun;Kim Chang-Soo
    • Annual Conference of KIPS
    • /
    • 2006.05a
    • /
    • pp.395-398
    • /
    • 2006
  • 무선 인터넷 기술의 발달과 함께 이동 컴퓨팅 환경에서 수치지도를 신속하게 출력하고, 이동 지역에 대한 수치지도를 무선 인터넷을 이용하여 클라이언트에 신속하고 효과적으로 전달하기 위해서 국립지리정보원에서 제공하는 수치지도의 경량화가 필요하다. 또한 인터넷의 방대한 자료를 지리정보시스템에서 효과적으로 이용할 수 있도록 화면상에 출력된 수치지도의 특정 건물이나 지역에 URL를 저장시키고, URL이 삽입된 수치지도상의 특정지역에서 사용자의 간단한 조작만으로 웹 사이트에 접속할 수 있도록 본 논문에서는 지리정보와 웹 정보의 연동을 위한 시스템을 설계 및 구현한다.

  • PDF