• Title/Summary/Keyword: Security design

Search Result 3,411, Processing Time 0.03 seconds

Block-Surveillance: Blockchain-based Surveillance Camera Video Management System Model and Design Method for City Safety (도시 안전을 위한 블록체인 기반의 감시카메라 영상 관리 시스템 모델 및 설계 방법)

  • Ji Woon Lee;Hee Suk Seo
    • Smart Media Journal
    • /
    • v.13 no.4
    • /
    • pp.65-75
    • /
    • 2024
  • This paper proposes a new approach to video surveillance systems, which have become essential components in modern urban management. By utilizing blockchain and IPFS, it enhances data integrity and privacy protection. Additionally, anomaly detection and automatic video storage are enabled through object detection technology, thus improving urban safety and security. This integrated approach serves as an efficient management methodology for surveillance systems, providing city administrators and citizens with a safer and more effective monitoring environment.

A Study on the Application of Industry 5.0 Technologies in Residential Welfare

  • Sun-Ju KIM
    • The Journal of Economics, Marketing and Management
    • /
    • v.12 no.5
    • /
    • pp.9-20
    • /
    • 2024
  • Purpose: This study aims to analyze the application of Industry 5.0 technologies to improve residential welfare, focusing on vulnerable groups such as the elderly and one-person households. Research design, data, and methodology: Through a literature review and SWOT analysis, it examines both the strengths and challenges of these technologies, which include AI, IoT, energy management solutions, and personalized systems. Results: The application of Industry 5.0 technologies in residential welfare offers opportunities for enhanced personalization, energy efficiency, and security, especially for vulnerable groups like the elderly and one-person households. However, challenges such as high costs, data privacy, infrastructure limitations, and technological inequality must be addressed to ensure equitable access and widespread adoption. Conclusions: The research identifies key areas for improvement, including data privacy, infrastructure limitations, and the need for equitable access to advanced housing solutions. By addressing these areas, the adoption of Industry 5.0 technologies can help create a more resilient, inclusive, and efficient residential welfare system for future generations.

Design and Implementation of Public Key Based Light Weight Security Protocol for Ubiquitous Sensor Network (유비쿼터스 센서 네트워크를 위한 공개키 기반의 보안 프로토콜 설계 및 구현)

  • Zhung, Yon-Il;Lee, Sung-Young
    • Annual Conference of KIPS
    • /
    • 2007.05a
    • /
    • pp.1072-1075
    • /
    • 2007
  • 유비쿼터스 컴퓨팅은 사용자에게 장소와 시간에 제약이 없이 자유롭게 네트워크에 접속 할 수 있는 환경을 제공하고 있다. 이러한 환경은 모든 정보의 공유 및 접근이 쉽게 이루어지는 반면, 인가되지 않은 사용자의 불법적인 접근도 쉽게 이루어질 수 있기 때문에 적합한 보안 정책이 필요하다. 특히 유비쿼터스 센서 네트워크의 센서 디바이스들은 제한된 전력을 이용하고 하드웨어적으로 작은 크기를 유지해야 하기 때문에 보안 정책 수립에 많은 제한이 발생하게 된다. 본 논문에서는 유비쿼터스 센서 네트워크에서 센서 노드의 제한적인 환경에서도 사용 가능한 공개키 기반의 보안 정책을 제안한다. 제안한 보안 프로토콜은 센서 노드에서 키 관리 및 보안 정책 적용을 최소한으로 포함시켜 저전력으로 사용 할 수 있는 공개키 기반의 보안 정책을 구현하였다. 성능 평가 결과 제안한 유비쿼터스 센서 네트워크에서 공개키를 사용한 저전력 보안 프로토콜은 센서 노드의 하드웨어 성능이 낮은 환경에서도 상대적으로 저전력으로 보안 정책의 활용이 가능 하였다.

A Study of Implementation for Home Networking Security System (홈 네트워크를 위한 보안 시스템 구현에 관한 연구)

  • Seol, Jeong-Hwan;Kim, In-Kyum;Lee, Ki-Young
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2008.05a
    • /
    • pp.616-619
    • /
    • 2008
  • In this paper, we design and implement the authentication system for home network service and applied it to actual sensor nodes. We achieved authentication key, encryption and decryption applied RC5 encryption algorithm of SNEP. In addition, we used pair-wise key pre-distribution for prevention of authentication sniffing in wireless sensor network. The experiment environment consists of a base station receiving data and sensor nodes sending data. Each sensor nodes sends both the data and encrypted authentication key to the base station. As a simulation environment, we assumed some what-if scenarios of security menaces in home network service. And we slightly altered the TOS_Msg construction of TinyOS. The experiences had shown that the malfunction doesn't happen in communication among other groups. And we confirmed in tests that the system is secure when a sensor having malicious propose is added.

  • PDF

Design and Implementation of a Client Mail Security System for Secure Mail Exchange using Public Key Infrastructure (공개키 기반 구조에서 안전한 메일 전송을 위한 클라이언트 메일 보안 시스템 설계 및 구현)

  • 정창렬;고진광
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.7 no.1
    • /
    • pp.149-157
    • /
    • 2003
  • Recently, the Internet enhanced by development of IT makes the processing and exchanging of information, As the Internet is sending and receiving digitized documents over the Internet e-mail system. The security of document information is being threated when exchanging digitized documents over an open network such as the Internet. The degree of threat is even higher when sensitive documents are involved Therefore, in this paper, the secure e-mail system on a client is designed and implemented in order to make secure exchanging of digitized documents. By using the public key infrastructure in which encrypted mail transmission, proof of delivery and integrity of the message are garanted, unauthorized manipulation, illegal acquisition and mutual authentication problem can be prevented in order to secure the document information which is crucial and sensible when exchanging the digitized document over the Internet. Futhenmore, by using the SET protocol based on public key cryptography, the secure mail system is designed and implemented in order for the users not having any professional knowledge to deal with the system easily and friendly in GUI environment.

Design of U-Healthcare Access Authority Control Model Using Context Constrain RBAC Model (상황제한 RBAC 모델을 이용한 U-헬스케어 접근권한 제어모델 설계)

  • Kim, Chang-Bok;Kim, Nam-Il;Park, Seong-Hwan
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.9 no.5
    • /
    • pp.233-242
    • /
    • 2009
  • The security of medical information need continued research about steady and flexible security model because of privacy of patient's as well as directly relation in the patient's life. In particular, u-healthcare environment is need flexible and detailed access control by variety changes of context. Control model analyzed relation of resource and authority, and analyzed authority about all accessible resource from access point using K2BASE. The context-based access control model can change flexibly authority change and role, and can obtain resource of authority granted and meaningly connected resource. As a result, this thesis can apply flexible and adaptive access control model at u-healthcare domain which context change various.

  • PDF

A Study on the Secure Double Pipe Hash Function (안전한 이중 파이프 해쉬함수에 관한 연구)

  • Kim, Hie-Do
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.10 no.6
    • /
    • pp.201-208
    • /
    • 2010
  • The classical iterated hash function is vulnerable to a multi-collision attack. Gauravaram et al. proposed 3C and 3C+ hash functions, in which an accumulation chain is added to usual Merkle-Damgard changing. Their goal is to design composition schemes resistant to generic attacks of Joux's type, but Joscak and Tuma have shown that 3C and 3C+ schemes are not better than Merkle-Damgard scheme in term of security against multi-collision attacks under some mild assumptions. In this dissertation, in order to increase security of 3C hash function, we proposed secure double pipe hash function which was effectively using XOR and XNOR operations per blocks of message. We seek to improve on the work of Lucks in a way. Proposed secure double pipe hash function takes resistance to multi-block collision, fixed point and pre-image attacks.

Design of Smart Phone-Based Braille Keyboard System for Visually Impaired People (시각 장애인을 위한 스마트폰 기반 점자형 문자 입력 시스템설계)

  • Eom, Tae-Jung;Lee, Jung-Bae;Kim, Byung-Gyu
    • Convergence Security Journal
    • /
    • v.12 no.1
    • /
    • pp.63-70
    • /
    • 2012
  • Recently, as the smart phone market grows explosively, there exists a large difference of utilization of the smart phone between an usual people and the visually impaired people. In this paper, We propose the character and numer ic input system based on the low cost of braille film and braille for the visually impaired people in order to reduce to information literacy gap for the visually impaired people. The proposed system is designed with the braille film and keyboard layout based on the braille character layout. Additionally, the telephone, the SMS, the abbreviated dial and location transfer function for the emergency situation are designed. The character which inputs using the braille keyboard can be automatically copied in the clip board and used in the other applications. Hence, the visually impaired people can easily use the smart phone for getting plentiful information on the device and network.

Design and Evaluation of DRM Model with Strong Security Based on Smart Card (스마트카드 기반의 강한 보안을 갖는 DRM 모델의 설계 및 평가)

  • Park, Jong-Yong;Kim, Young-Hak;Choe, Tae-Young
    • Journal of Digital Contents Society
    • /
    • v.12 no.2
    • /
    • pp.165-176
    • /
    • 2011
  • Recently, digital rights management (DRM) related researches are widely spreading with prosperity of IT industries. The DRM technology protects proprietor of copyright by preventing mischanneling and illegal copy. In this paper, we propose a new DRM model that has an enhanced and efficient protocol based on certificate using smart card. The proposed model overcomes weaknesses of WCDRM model and has following additional advantages: first, copy protection is enhanced by hiding user's specific information from attacker by storing the information within smart card; second, server load for contents encryption is reduced by making clear protocols among author, distributer, certificate authority, and users; third, offline user authentication is guaranteed by combining partial secret values in media players and smart card. Exposure of core information also is minimized by storing them in smart card. In addition, we show that the proposed system is more secure than WCDRM model by comparing various factors of anonymous attackers.

A Study on the Trade-Economic Effects and Utilization of AEO Mutual Recognition Agreements

  • LEE, Chul-Hun;HUH, Moo-Yul
    • The Journal of Industrial Distribution & Business
    • /
    • v.11 no.2
    • /
    • pp.25-31
    • /
    • 2020
  • Purpose: The AEO (Authorized Economic Operator) program, created in 2001 in the United States due to 9.11 terrorist's attack, fundamentally changed the trade environment. Korea, which introduced AEO program in 2009, has become one of the world's top countries in the program by ranking 6th in the number of AEO certified companies and the world's No. 1 in MRA (Mutual Recognition Agreement) conclusions. In this paper, we examined what trade-economic and non-economic effects the AEO program and its MRA have in Korea. Research design, data and methodology: In this study we developed a model to verify the impact between utilization of AEO and trade-economic effects of the AEO and its MRA. After analyzing the validity and reliability of the model through Structural Equation Model we conducted a survey to request AEO companies to respond their experience on the effects of AEO program and MRA. As a result, 196 responses were received from 176 AEO companies and utilized in the analysis. Results: With regard to economic effects, the AEO program and the MRA have not been directly linked to financial performance, such as increased sales, increased export and import volumes, reduced management costs, and increased operating profit margins. However, it was analyzed that the positive effects of supply chain management were evident, such as strengthening self-security, monitoring and evaluating risks regularly, strengthening cooperation with trading companies, enhancing cargo tracking capabilities, and reducing the time required for export and import. Conclusions: When it comes to the trade-economic effects of AEO program and its MRA, AEO companies did not satisfy with direct effects, such as increased sales and volume of imports and exports, reduced logistics costs. However, non-economic effects, such as reduced time in customs clearance, freight tracking capability, enhanced security in supply chain are still appears to be big for them. In a rapidly changing trade environment the AEO and MRA are still useful. Therefore the government needs to encourage non-AEO companies to join the AEO program, expand MRA conclusion with AEO adopted countries especially developing ones and help AEO companies make good use of AEO and MRA.