• Title/Summary/Keyword: Sensor Security

Search Result 909, Processing Time 0.024 seconds

Smartphone Security Using Fingerprint Password (다중 지문 시퀀스를 이용한 스마트폰 보안)

  • Bae, Kyoung-Yul
    • Journal of Intelligence and Information Systems
    • /
    • v.19 no.3
    • /
    • pp.45-55
    • /
    • 2013
  • Thereby using smartphone and mobile device be more popular the more people utilize mobile device in many area such as education, news, financial. In January, 2007 Apple release i-phone it touch off rapid increasing in user of smartphone and it create new market and these broaden its utilization area. Smartphone use WiFi or 3G mobile radio communication network and it has a feature that can access to internet whenever and anywhere. Also using smartphone application people can search arrival time of public transportation in real time and application is used in mobile banking and stock trading. Computer's function is replaced by smartphone so it involves important user's information such as financial and personal pictures, videos. Present smartphone security systems are not only too simple but the unlocking methods are spreading out covertly. I-phone is secured by using combination of number and character but USA's IT magazine Engadget reveal that it is easily unlocked by using combination with some part of number pad and buttons Android operation system is using pattern system and it is known as using 9 point dot so user can utilize various variable but according to Jonathan smith professor of University of Pennsylvania Android security system is easily unlocked by tracing fingerprint which remains on the smartphone screen. So both of Android and I-phone OS are vulnerable at security threat. Compared with problem of password and pattern finger recognition has advantage in security and possibility of loss. The reason why current using finger recognition smart phone, and device are not so popular is that there are many problem: not providing reasonable price, breaching human rights. In addition, finger recognition sensor is not providing reasonable price to customers but through continuous development of the smartphone and device, it will be more miniaturized and its price will fall. So once utilization of finger recognition is actively used in smartphone and if its utilization area broaden to financial transaction. Utilization of biometrics in smart device will be debated briskly. So in this thesis we will propose fingerprint numbering system which is combined fingerprint and password to fortify existing fingerprint recognition. Consisted by 4 number of password has this kind of problem so we will replace existing 4number password and pattern system and consolidate with fingerprint recognition and password reinforce security. In original fingerprint recognition system there is only 10 numbers of cases but if numbering to fingerprint we can consist of a password as a new method. Using proposed method user enter fingerprint as invested number to the finger. So attacker will have difficulty to collect all kind of fingerprint to forge and infer user's password. After fingerprint numbering, system can use the method of recognization of entering several fingerprint at the same time or enter fingerprint in regular sequence. In this thesis we adapt entering fingerprint in regular sequence and if in this system allow duplication when entering fingerprint. In case of allowing duplication a number of possible combinations is $\sum_{I=1}^{10}\;{_{10}P_i}$ and its total cases of number is 9,864,100. So by this method user retain security the other hand attacker will have a number of difficulties to conjecture and it is needed to obtain user's fingerprint thus this system will enhance user's security. This system is method not accept only one fingerprint but accept multiple finger in regular sequence. In this thesis we introduce the method in the environment of smartphone by using multiple numbered fingerprint enter to authorize user. Present smartphone authorization using pattern and password and fingerprint are exposed to high risk so if proposed system overcome delay time when user enter their finger to recognition device and relate to other biometric method it will have more concrete security. The problem should be solved after this research is reducing fingerprint's numbering time and hardware development should be preceded. If in the future using fingerprint public certification becomes popular. The fingerprint recognition in the smartphone will become important security issue so this thesis will utilize to fortify fingerprint recognition research.

Report of East Sea Crossing by Underwater Glider (수중 글라이더를 이용한 동해 횡단 사례 보고)

  • Park, Yo-Sup;Lee, Shin-Je;Lee, Yong-Kuk;Jung, Seom-Kyu;Jang, Nam-Do;Lee, Ha-Woong
    • The Sea:JOURNAL OF THE KOREAN SOCIETY OF OCEANOGRAPHY
    • /
    • v.17 no.2
    • /
    • pp.130-137
    • /
    • 2012
  • The underwater glider using conception of Lagrangian method, is a new observation platform to understand the properties of the ocean vertically. In 2011 March, KORDI made a first successful autonomous trip from Hupo to west coast of Uleungdo piloting Littoral Glider of Alaska Native Technology LLC. The journey considered many environmental variables and route vigilantly selected, the glider covered 177 km horizontally and took approximately 6 days (153 hours). Despite the existence of 1 kt eddy current, Sound velocity sampling was conducted from 5 meters and reaching maximum of 200 meters depth at each dive. It successfully collected sound velocity and temperature profile at every 5 seconds totaling up to 1408 profiles using SVT&P sensor. During the flight it was also a mission to check the diverse modes of the glider i.e. spiral, waypoints, heading, drift and hover could function without a defect in a given situation. These modes were thoroughly monitored and it could be considered that the glider handled it well during the flight. As a result of this test flight, it was evident that the given underwater glider could operate under 2kt current environment with users defined heading and depth, also with the payload up to 5 kg without changing internal buoyancy.

A Study on Customized Smart Fire and Security System for one person household (1인 가구를 위한 맞춤형 스마트 화재 및 방범 시스템에 대한 연구)

  • Han, Hoonyoung;Kim, Gyunho;Ju, Minsu;Ko, Dongbeom;Kim, Jungjoon;Park, Jeongmin
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.19 no.1
    • /
    • pp.295-304
    • /
    • 2019
  • This paper introduces a customized Smart Fire and Crime system for one person households. Recently, the number of one person household has skyrocketed due to the increasing number of one person household and the aging population. As a result, the demand for private security companies for one person household is increasing and smart security systems that are applied with rapidly evolving IoT and sensor technologies are also becoming a major issue. However, despite the increasing trend of one person households, the existing system focuses on multiple households, so that there are disadvantages of the one person households to operate in such a big system which operate separately. Therefore, in this paper, we design and implement a system that provides a personalized safety service for one person household that integrates a security system and a fire monitoring system. This will help prevent criminal activity in places where the police can not reach at a lower cost than using existing private companies, and help monitor the situation of the houses in real time.

Materials Compatibility and Structure Optimization of Test Department Probe for Quality Test of Fingerprint Sensor (지문인식센서 품질평가를 위한 검사부 프로브의 소재 적합성과 구조 최적화 연구)

  • Son, Eun-Won;Youn, Ji Won;Kim, Dae Up;Lim, Jae-Won;Kim, Kwang-Seok
    • Journal of the Microelectronics and Packaging Society
    • /
    • v.24 no.4
    • /
    • pp.73-77
    • /
    • 2017
  • Recently, fingerprint sensors have widely used for personal information security, and require quality evaluation to reduce an error of their recognition rate. Quality of fingerprint sensors is evaluated by variation of their electrical resistance introducing by contacts between a probe tip and a sensor electrode, Investigation on the materials compatability and structure optimization of probe is required to reduce deformation of sensor electrode for repeatability of quality testing. Nickel, steel(SK4), beryllium copper, and phosphor bronze were considered as probe materials, and beryllium copper was the most appropriate for materials of probe tips, considering indentation and contact resistance while being contacted probe tips on electrodes. Probes of an inspection part were manufactured with the single-unit structure for physical damage prevention and parallel processing capability. Inspection repeatability was evaluated by voltage variation of fingerprint sensors when the specific current was applied. A single-unit inspection part with beryllium copper probe tips showed excellent repeatability within ${\pm}0.003V$ of its voltage variation.

An efficient Broadcast Authentication Scheme for Wireless Sensor Networks (무선 센서 네트워크에서의 효율적 Broadcast Authentication 방안)

  • Moon Hyung-Seok;Lee Sung-Chang
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.43 no.6 s.348
    • /
    • pp.23-29
    • /
    • 2006
  • It is difficult to apply conventional security algorithms to the wireless sensor networks composed of nodes that have resource constraints such as memory, computing, power resources limitation. Generally, shared key based algorithms with low resource consumption and short key length are used for broadcast packets in authentication of base station. But it is not suitable that all the nodes hold the same shared key only for packet authentication. Recently, broadcast authentication algorithm for sensor network is proposed, which uses key chain generation by one-way hash function, Message Authentication Code generation by each keys of the key chains and delayed key disclosure. It provides suitable authentication method for wireless sensor networks but may leads to inefficient consequence with respect to network conditions such as broadcast ratio, key chain level, and so on. In this paper, we propose an improved broadcast authentication algorithm that uses key chain link and periodical key disclosure. We evaluated the performance of proposed algorithm using TOSSIM(TinyOS Simulator) in TinyOS. The results show that the proposed algorithm ensures low authentication delay, uses memory and computing resource of receiving nodes efficiently and reduces the amount of packet transmitting/receiving.

Implementation of Segway Using Pressure Sensors (압력센서를 이용한 세그웨이 개발)

  • Jo, Sung-Chan;Kang, Su-Min;Huh, Kyung-Moo;Joo, Young-Bok
    • Journal of the Institute of Electronics and Information Engineers
    • /
    • v.50 no.1
    • /
    • pp.285-290
    • /
    • 2013
  • As well as the advanced development of modern society, and the environmental problems caused by the use of fossil fuels is emerging. So do not reap the performance level of the car to be able to replace existing fossil fuel and low-emission energy and technology development are continually strives. Therefore, this study aims to present the direction of the new interface 21st century Mobile Auto Electric Segway technology in the field of security and disadvantages based. The Segway is a problem because the control itself skewed by certain slope where the slope in the wrong adjustment tipping. In this study, the year saw the introduction of two pressure sensors(Load cell) used to solve these drawbacks, according to the ratio of the weight control methods. In addition, the ramps operate in a straightforward, using an acceleration sensor and a gyro sensor in order to compensate for the slope value in free control method to study looked. Measured by calculating the value of the occupant's weight and according to the inclination of the pressure sensor pressure sensing experiment results this year, we can see that the control variable for the change in body weight is greater than the inclination. Segway is also easy to control, and the stability of the ramps, etc. As a result, created using a pressure sensor.

Lightweight Individual Encryption for Secure Multicast Dissemination over WSNs (무선 센서네트워크에서 경량화 개인별 암호화를 사용한 멀티캐스트 전송기법)

  • Park, Taehyun;Kim, Seung Young;Kwon, Gu-In
    • Journal of the Korea Society of Computer and Information
    • /
    • v.18 no.11
    • /
    • pp.115-124
    • /
    • 2013
  • In this paper, we suggest a secure data dissemination by Lightweight Individual Encryption Multicast scheme over wireless sensor networks using the individual encryption method with Forward Error Correction instead of the group key encryption method. In wireless sensor networks, a sink node disseminates multicast data to the number of sensor nodes to update the up to date software such as network re-programming and here the group key encryption method is the general approach to provide a secure transmission. This group key encryption approach involves re-key management to provide a strong secure content distribution, however it is complicated to provide group key management services in wireless sensor networks due to limited resources of computing, storage, and communication. Although it is possible to control an individual node, the cost problem about individual encryption comes up and the individual encryption method is difficult to apply in multicast data transmission on wireless sensor networks. Therefore we only use 0.16% of individually encrypted packets to securely transmit data with the unicast to every node and the rest 99.84% non-encrypted encoded packets is transmitted with the multicast for network performance.

Emerging Internet Technology & Service toward Korean Government 3.0

  • Song, In Kuk
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.8 no.2
    • /
    • pp.540-546
    • /
    • 2014
  • Recently a new government has announced an action plan known as the government 3.0, which aims to provide customized services for individual people, generate more jobs and support creative economy. Leading on from previous similar initiatives, the new scheme seeks to focus on open, share, communicate, and collaborate. In promoting Government 3.0, the crucial factor might be how to align the core services and policies of Government 3.0 with correspoding technologies. The paper describes the concepts and features of Government 3.0, identifies emerging Internet-based technologies and services toward the initiative, and finally provides improvement plans for Government 3.0. As a result, 10 issues to be brought together include: Smart Phone Applications and Service, Mobile Internet Computing and Application, Wireless and Sensor Network, Security & Privacy in Internet, Energy-efficient Computing & Smart Grid, Multimedia & Image Processing, Data Mining and Big Data, Software Engineering, Internet Business related Policy, and Management of Internet Application.

Technical Trend of Security in Ubiquitous Sensor Networks (u-센서 네트워크 보안 기술 동향)

  • Kim, S.H.;Kang, Y.S.;Chung, B.H.;Chung, K.I.
    • Electronics and Telecommunications Trends
    • /
    • v.20 no.1 s.91
    • /
    • pp.93-99
    • /
    • 2005
  • 최근 새롭게 등장한 유비쿼터스 컴퓨팅 환경은 기존의 컴퓨팅 환경과는 다르게 통신 인프라가 없는 환경에서도 동작이 가능한 저전력 소출력의 무선 센서간의 네트워크를 형성하고 이들간의 정보 유통이 이루어진다. 이러한 u-센서 네트워크는 Ad-hoc 성격뿐만 아니라 무선이 가지는 방송 특성으로 센서정보의 도청, 비정상적 패킷의 유통, 메시지의 재사용 등의 데이터 위. 변조 문제와 네트워크 전체를 마비시킬 수 있는 서비스 거부 등의 공격에 쉽게 노출된다. 본 고에서는 센서 네트워크에서의 정보보호요구사항과 구조, 키 관리의 문제 및 라우팅과 수집된 데이터를 집계하는 데 있어서의 보안 이슈와 동향에 대해 소개한다.

Research Trend for Sensor Network Security (센서 네트워크 보안 연구 동향)

  • Nah, J.H.;Chae, K.J.;Chung, K.I.
    • Electronics and Telecommunications Trends
    • /
    • v.20 no.1 s.91
    • /
    • pp.112-122
    • /
    • 2005
  • 센서 네트워크는 많은 수의 센서 노드들로 구성된 네트워크로 센서를 통한 주변 정보 감지 및 감지된 정보를 처리하는 기능을 수행한다. 최근 유비쿼터스 컴퓨팅 개념의 도입과 함께 이를 실생활에 구현하기위한 기반 기술의 하나로 센서 네트워크가 큰 관심을 모으고 있다. 그러나 유비쿼터스 컴퓨팅을 통한삶의 편리성을 추구함과 동시에 네트워킹을 통해 제공되는 정보를 신뢰할 수 있어야 하며 개인의 프라이버시 또한 보장되어야 함은 기본적인 요구 사항이다. 센서 네트워크는 기존의 네트워크와 여러 모로 다른 특성을 갖고 있어 기존의 보안 기법을 그대로 적용하기 어렵다. 이러한 필요성에 의해 다양한 센서 네트워크 보안 관련 연구가 진행되고 있는데 본 고에서는 최근 가장 활발히 연구되고 있는 센서 네트워크 보안에 관련된 인증, 키관리, 네트워크 구조 등을 중심으로 연구 동향을 살펴본다.