• Title/Summary/Keyword: Smart Device Security

Search Result 309, Processing Time 0.025 seconds

Study on Battery Power based IoT Device Lightweight Authentication Protocol (베터리 전력 환경 IoT 디바이스 경량 인증 프로토콜 연구)

  • Sung-Hwa Han
    • Convergence Security Journal
    • /
    • v.24 no.3
    • /
    • pp.165-171
    • /
    • 2024
  • Due to the IT convergence trend, many industrial domains are developing their own IoT services. With batteries and lightweight devices, IoT could expand into various fields including smart farms, smart environments, and smart energy. Many battery-powered IoT devices are passive in enforcing security techniques to maintain service time. This is because security technologies such as cryptographic operations consume a lot of power, so applying them reduces service maintenance time. This vulnerable IoT device security environment is not stable. In order to provide safe IoT services, security techniques considering battery power consumption are required. In this study, we propose an IoT device authentication technology that minimizes power consumption. The proposed technology is a device authentication function based on the Diffie-Hell man algorithm, and has the advantage that malicious attackers cannot masquerade the device even if salt is leaked during the transmission section. The battery power consumption of the authentication technology proposed in this study and the ID/PW-based authentication technology was compared. As a result, it was confirmed that the authentication technique proposed in this study consumes relatively little power. If the authentication technique proposed in this study is applied to IoT devices, it is expected that a safer IoT security environment can be secured.

A Review on Smart Two Wheeler Helmet with Safety System Using Internet of Things

  • Ilanchezhian, P;Shanmugaraja, P;Thangaraj, K;Aldo Stalin, JL;Vasanthi, S
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.6
    • /
    • pp.11-16
    • /
    • 2021
  • At the present time, the number of accidents has enlarged speedily and in country like India per day there are about 204 accidents occurred. Accidents of two-wheeler compose a foremost segment of every accident and it can be true for the reason that two-wheelers like bikes not able to produce as many as security measurements normally incorporated in cars, truks and bus etc. General main rootcost of the two-wheeler accidents happen only when people community not remember to wearing a device helmet and during the driving time feels like sleep condition, alcohol disbursement, many of the drivers doesn't know heavy vehicles like Loory and buses approaching into very closer to their two wheelers, contravention of two wheelers in traffic rules and regulations. Let's overcome the above situations; our important objective is to develop an intelligent system device that can successfully facilitate in avoidance of every kind of problems. Suppose any of the above stated situations occurs, at that moment how system device identify and represents the commanders and community, and finally the stated situation be able to taken care of straight away without any further delay. A smart intelligent helmet system is a defending head covering used by rider for making bike riding safer than earlier. This is finished by incorporating sophisticated features like detecting the usage of helmet by the rider, connected Bluetooth module in helmet. In order to maintain the temperature inside the helmet device we need to include CPU fan module inside the device. RF based helmet prevents road accidents and identify whether people community is not using a component helmet or used. Main responsibility of the system is to detect accidents by vibration sensors, accelerometers and also with the help of modules global positioning system and global system for mobile commnicaiton module. A wireless communication device used to discover the accident area site location and likewise notifying the two-wheeler drived people's relatives and short message text information passed to the positioned hospitals.

A Case Study on Implementation of Mobile Information Security (모바일 정보보안을 위한 실시간 모바일 기기 제어 및 관리 시스템 설계.구현 사례연구)

  • Kang, Yong-Sik;Kwon, Sun-Dong;Lee, Kang-Hyun
    • Information Systems Review
    • /
    • v.15 no.2
    • /
    • pp.1-19
    • /
    • 2013
  • Smart working sparked by iPhone3 opens a revolution in smart ways of working at any time, regardless of location and environment. Also, It provide real-time information processing and analysis, rapid decision-making and the productivity of businesses, including through the timely response and the opportunity to increase the efficiency. As a result, every company are developing mobile information systems. But company data is accessed from the outside, it has problems to solve like security, hacking and information leakage. Also, Mobile devices such as smart phones belonging to the privately-owned asset can't be always controlled to archive company security policy. In the meantime, public smart phones owned by company was always applied security policy. But it can't not apply to privately-owned smart phones. Thus, this paper is focused to archive company security policy, but also enable the individual's free to use of smart phones when we use mobile information systems. So, when we use smart phone as individual purpose, the normal operation of all smart phone functions. But, when we use smart phone as company purpose like mobile information systems, the smart phone functions are blocked like screen capture, Wi-Fi, camera to protect company data. In this study, we suggest the design and implementation of real time control and management of mobile device using MDM(Mobile Device Management) solution. As a result, we can archive company security policy and individual using of smart phone and it is the optimal solution in the BYOD(Bring Your Own Device) era.

  • PDF

A Design of Device Identification and Communication Method for Secure Device Monitoring based Smart Phone (스마트폰 기반에서 안전한 디바이스 모니터링을 위한 디바이스 식별 및 통신 기법 설계)

  • Jin, Byungwook;Ahn, Heuihak;Jun, Moonseog
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.13 no.1
    • /
    • pp.69-78
    • /
    • 2017
  • As the smartphone-based devices are diffused and developed rapidly, they provide the convenience to the users. The abovementioned sentence technologies are being used not only in the existing sensor and wireless network technology but also in the application services of the diverse fields application services such as smart appliance, smart car, smart health care, etc. and the new fusion paradigm from the industry is presented by undertaking the researches in diverse area by the enterprises and research institutions. However, the smart environment exposes its weaknesses in the mobile terminal area, existing wireless network and IT security area. In addition, due to new and variant ways of attack, not only the critical information are disclosed However also the financial damages occur. This paper proposed the protocol to perform the smartphone-based safe device monitoring and safe communication. The proposed protocol designed the management procedure of registration, identification, communication protocol and device update management protocol and the safety against the attack techniques such as the an-in-the-middle-attack, impersonation attack, credential threat, information leaks and privacy invasion was analyzed. It was observed that the proposed protocol showed the performance improved by approximately 52% in the communication process than the existing system.

A Design of Secure Communication Framework for Device Management and User Authentication in Wireless Network Environment (무선 네트워크 환경에서 기기 관리 및 사용자 인증을 위한 안전한 통신 프레임워크 설계)

  • Park, JungOh
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.15 no.2
    • /
    • pp.43-52
    • /
    • 2019
  • The recent technological developments of smart devices, multiple services are provided to enhance the users' quality of life including smart city, smart energy, smart car, smart healthcare, smart home, and so on. Academia and industries try to provide the users with convenient services upon seamless technological research and developments. Also, whenever and wherever a variety of services can be used without any limitation on the place and time upon connecting with different types of devices. However, security weaknesses due to integrations of multiple technological elements have been detected resulting in the leakage of user information, account hacking, and privacy leakage, threats to people's lives by device operation have been raised. In this paper, safer communication framework is suggested by device control and user authentication in the mobile network environment. After implementations of registration and authentication processes by users and devices, safe communication protocol is designed based on this. Also, renewal process is designed according to the safe control of the device. In the performance evaluation, safety was analyzed on the attack of protocol change weakness occurred in the existing system, service halt, data leakage, illegal operation control of message, and so on, which confirmed the enhanced speed approximately by 8% and 23% in the communication and verification parts, respectively, compared to the existing system.

A Study on Privilege Elevation Attack Management for Smart Transaction Security on BlockChain Etherium Based System

  • Min, Youn-A
    • Journal of the Korea Society of Computer and Information
    • /
    • v.24 no.4
    • /
    • pp.65-71
    • /
    • 2019
  • IAs smart device penetration rate is more than 90%, mobile transaction ratio using smart device is increasing. Smart contracts are used in various areas of real life including smart trading. By applying smart contracts to the platform for smart transactions through block-chain technology, the threat of hacking or forgery can be reduced. However, various threats to devices in smart transactions can pose a threat to the use of block chain Etherium, an important element in privilege and personal information management. Smart contract used in block chain Ethereum includes important information or transaction details of users. Therefore, in case of an attack of privilege elevation, it is very likely to exploit transaction details or forge or tamper with personal information inquiry. In this paper, we propose a detection and countermeasure method for privilege escalation attack, which is especially important for block chain for secure smart transaction using block chain Ethereum. When comparing the results of this study with the results of similar applications and researches, we showed about 12~13% improvement in performance and suggested the future countermeasures through packet analysis.

Design and Implementation of the Smart Fire Detection System and Automatic Extinguish Device Interface Platform based on Thermal Imaging Camera (적외선 열 영상 카메라 기반의 스마트 화재감지 시스템 및 자동소화 장치 인터페이스 플랫폼의 설계 및 구현)

  • Chang, Rak-Ju;Lee, Soon-Yi;Kang, Suk-Won;Lee, Dong Myung
    • Proceedings of the Korea Contents Association Conference
    • /
    • 2014.11a
    • /
    • pp.7-8
    • /
    • 2014
  • The smart fire detection and automatic extinguish device interface platform based on thermal imaging camera that early monitors fire is designed and implemented in this paper. If a fire occurs in some area, the developed system can detect and automatically extinguish the fire. The major functions for developing the system are: Image system and Viewer for fire detection based on Thermal imaging camera and Megapixel camera; Automatic extinuish device for early fir detection; Interface platform between monitoring systems and automatic extinguish device.

  • PDF

An Integrative Method of FTA and FMEA for Software Security Analysis of a Smart Phone (스마트 폰의 소프트웨어 보안성 분석을 위한 FTA와 FMEA의 통합적 방법)

  • Kim, Myong-Hee;Toyib, Wildan;Park, Man-Gon
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.2 no.12
    • /
    • pp.541-552
    • /
    • 2013
  • Recently software security of the smart phone is an important issue in the field of information science and technology due to fast propagation of smart technology in our life. The smart phone as the security critical systems which are utilizing in terminal systems of the banking, ubiquitous home management, airline passengers screening, and so on are related to the risk of costs, risk of loss, risk of availability, and risk by usage. For the security issues, software hazard analysis of smart phone is the key approaching method by use of observed failures. In this paper, we propose an efficient integrative framework for software security analysis of the smart phone using Fault Tree Analysis (FTA) and Failure Mode Effect Analysis (FMEA) to gain a convergence security and reliability analysis technique on hand handle devices. And we discuss about that if a failure mode effect analysis performs simpler, not only for improving security but also reducing failure effects on this smart device, the proposed integrative framework is a key solution.

Building Control Box Attached Monitor based Color Grid Recognition Methods for User Access Authentication

  • Yoon, Sung Hoon;Lee, Kil Soo;Cha, Jae Sang;Khudaybergenov, Timur;Kim, Min Soo;Woo, Deok Gun;Kim, Jeong Uk
    • International Journal of Internet, Broadcasting and Communication
    • /
    • v.12 no.2
    • /
    • pp.1-7
    • /
    • 2020
  • The secure access the lighting, Heating, ventilation, and air conditioning (HVAC), fire safety, and security control boxes of building facilities is the primary objective of future smart buildings. This paper proposes an authorized user access to the electrical, lighting, fire safety, and security control boxes in the smart building, by using color grid coded optical camera communication (OCC) with face recognition Technologies. The existing CCTV subsystem can be used as the face recognition security subsystem for the proposed approach. At the same time a smart device attached camera can used as an OCC receiver of color grid code for user access authentication data sent by the control boxes to proceed authorization. This proposed approach allows increasing an authorization control reliability and highly secured authentication on accessing building facility infrastructure. The result of color grid code sequence received by the unauthorized person and his face identification allows getting good results in security and gaining effectiveness of accessing building facility infrastructure. The proposed concept uses the encoded user access authentication information through control box monitor and the smart device application which detect and decode the color grid coded informations combinations and then send user through the smart building network to building management system for authentication verification in combination with the facial features that gives a high protection level. The proposed concept is implemented on testbed model and experiment results verified for the secured user authentication in real-time.

Car Theft Protection System using CAN Communication and Smart Devicenment (CAN 통신과 Smart Device를 이용한 차량 도난 방지 System)

  • Kim, Jae-Kyung;Hwang, Man-Tae;Kim, Young-Kil
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.15 no.10
    • /
    • pp.2136-2142
    • /
    • 2011
  • Smart Device Communications using the development of anti-theft system for vehicles have been investigated. because Progress of Smart Device If someone get the Key for Vehicle theft, he can be easily stolen vehicle. We thought about the concept of dual security devices. Using vehicle's identifier ID of CAN, when Comparing Smat phone identifier ID value and identifier ID received from the Can in the Head, If the same ID is compared. At this point after the activity of the vehicle's ACC On/Off the system allows the vehicle's ignition.