• Title/Summary/Keyword: Smart key

Search Result 1,239, Processing Time 0.032 seconds

A Study on the Influence of Smart Factory Key Factors on Management Performance through Internal Environmental Factors in Small and Medium Businesses (중소기업에서 내부 환경요인을 통한 Smart Factory 핵심요인이 경영성과에 미치는 영향 연구)

  • Jin, Sung-Ok;Seo, Young Wook
    • Journal of Digital Convergence
    • /
    • v.17 no.7
    • /
    • pp.115-124
    • /
    • 2019
  • This study is an empirical study of 'the effect of the key factors of Smart Factory on management performance through internal environmental factors in small and medium enterprises'. The purpose of the research is to verify that the implementation of a Smart Factory affects the performance of management and contribute to the continued development of the company, and to suggest the national policy of expanding the deployment of a Smart Factory. The procedures were surveyed by working-level officials of small and medium-sized manufacturing companies with a Smart Factory and statistically analyzed with the SPSS and SMART PLS. The results of the study showed that first, the environmental factors within the company had a positive effect on the key components of the Smart Factory. Second, the key factor in Smart Factory has had a positive impact on management performance. The above evidence shows that the key factors in smart factory considering the environmental factors of an enterprise affect its management performance, thus laying the theoretical foundation for the performance of smart factory construction. In the future, we will study how to build a Smart Factory.

Per-transaction Shared Key Scheme to Improve Security on Smart Payment System

  • Ahmad, Fawad;Jung, Younchan
    • International Journal of Internet, Broadcasting and Communication
    • /
    • v.8 no.1
    • /
    • pp.7-18
    • /
    • 2016
  • Several authentication methods have been developed to make use of tokens in the mobile networks and smart payment systems. Token used in smart payment system is genearated in place of Primary Account Number. The use of token in each payment transaction is advantageous because the token authentication prevents enemy from intercepting credit card number over the network. Existing token authentication methods work together with the cryptogram, which is computed using the shared key that is provisioned by the token service provider. Long lifetime and repeated use of shared key cause potential brawback related to its vulnerability against the brute-force attack. This paper proposes a per-transaction shared key mechanism, where the per-transaction key is agreed between the mobile device and token service provider for each smart payment transaction. From server viewpoint, per-transaction key list is easy to handle because the per-transaction key has short lifetime below a couple of seconds and the server does not need to maintain the state for the mobile device. We analyze the optimum size of the per-transaction shared key which satisfy the requirements for transaction latency and security strength for secure payment transactions.

A Systematic Review on Smart Manufacturing in the Garment Industry

  • Kim, Minsuk;Ahn, Jiseon;Kang, Jihye;Kim, Sungmin
    • Fashion & Textile Research Journal
    • /
    • v.22 no.5
    • /
    • pp.660-675
    • /
    • 2020
  • Since Industry 4.0, there is a growing interest in smart manufacturing across all industries. However, there are few studies on this topic in the garment industry despite the growing interest in implementing smart manufacturing. This paper presents the feasibility and essential considerations for implementing smart manufacturing in the garment industry. A systematic review analysis was conducted. Studies on garment manufacturing and smart manufacturing were searched separately in the Scopus database. Key technologies for each manufacturing were derived by keyword analysis. Studies on key technologies in each manufacturing were selected; in addition, bibliographic analysis and cluster analysis were conducted to understand the progress of technological development in the garment industry. In garment manufacturing, technology studies are rare as well as locally biased. In addition, there are technological gaps compared to other manufacturing. However, smart manufacturing studies are still in their infancy and the direction of garment manufacturing studies are toward smart manufacturing. More studies are needed to apply the key technologies of smart manufacturing to garment manufacturing. In this case, the progress of technology development, the difference in the industrial environment, and the level of implementation should be considered. Human components should be integrated into smart manufacturing systems in a labor-intensive garment manufacturing process.

Development of wearable device with smart key function and convergence of personal bio-certification and technology using ECG signal (심전도 신호를 이용한 개인 바이오인증 기술 융합과 smart key 기능이 탑재된 wearable device 개발)

  • Bang, Gul-Won
    • Journal of Digital Convergence
    • /
    • v.20 no.5
    • /
    • pp.637-642
    • /
    • 2022
  • Self-authentication technology using electrocardiogram (ECG) signals is drawing attention as a self-authentication technology that can replace existing bio-authentication. A device that recognizes a digital electronic key can be mounted on a vehicle to wirelessly exchange data with a car, and a function that can lock or unlock a car door or start a car by using a smartphone can be controlled through a smartphone. However, smart keys are vulnerable to security, so smart keys applied with bio-authentication technology were studied to solve this problem and provide driver convenience. A personal authentication algorithm using electrocardiogram was mounted on a watch-type wearable device to authenticate bio, and when personal authentication was completed, it could function as a smart key of a car. The certification rate was 95 per cent achieved. Drivers do not need to have a smart key, and they propose a smart key as an alternative that can safely protect it from loss and hacking. Smart keys using personal authentication technology using electrocardiogram can be applied to various fields through personal authentication and will study methods that can be applied to identification devices using electrocardiogram in the future.

Group Key Management Method for Secure Device in Smart Home Environment (스마트홈 환경에서의 안전한 디바이스 관리를 위한 그룹키 관리 기법)

  • Ryu, Ho-Seok;Kwak, Jin
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.25 no.2
    • /
    • pp.479-487
    • /
    • 2015
  • According to IT development, smart home services is providing remote service, monitoring service and other various services through smart home devices based on network. But, smart home environment exists security threats such as data falsification, illegal authentication and invasion of privacy through a malicious device. Smart home is studying to prevent these security threats, but the studies of smart home environment security are still in early stage of development and the studies of group key management method is lacking in smart home. In this paper, we propose the group key management method for secure device in smart home.

A multi-radio sink node designed for wireless SHM applications

  • Yuan, Shenfang;Wang, Zilong;Qiu, Lei;Wang, Yang;Liu, Menglong
    • Smart Structures and Systems
    • /
    • v.11 no.3
    • /
    • pp.261-282
    • /
    • 2013
  • Structural health monitoring (SHM) is an application area of Wireless Sensor Networks (WSNs) which usually needs high data communication rate to transfer a large amount of monitoring data. Traditional sink node can only process data from one communication channel at the same time because of the single radio chip structure. The sink node constitutes a bottleneck for constructing a high data rate SHM application giving rise to a long data transfer time. Multi-channel communication has been proved to be an efficient method to improve the data throughput by enabling parallel transmissions among different frequency channels. This paper proposes an 8-radio integrated sink node design method based on Field Programmable Gate Array (FPGA) and the time synchronization mechanism for the multi-channel network based on the proposed sink node. Three experiments have been performed to evaluate the data transfer ability of the developed multi-radio sink node and the performance of the time synchronization mechanism. A high data throughput of 1020Kbps of the developed sink node has been proved by experiments using IEEE.805.15.4.

Usability Evaluation of the Touch Keys for the Smart Watch (스마트 워치 터치스크린에서의 터치 키에 대한 사용성 연구)

  • Kim, Su Young;Ban, Kimin;Choe, Jaeho;Jung, Eui S.
    • Journal of Korean Institute of Industrial Engineers
    • /
    • v.41 no.3
    • /
    • pp.225-232
    • /
    • 2015
  • The smart watch is the most popular wearable computing device because it takes a form of wristwatch. Many smart watches have adopted the touch screen interface due to the limited size of display. This paper focuses on touch key size and spacing that affect the usability about the touch key of smart watch. The experiments were made for four touch key sizes (width${\times}$height; $5{\times}5$, $5{\times}7$, $7{\times}5$, $7{\times}7mm$) and nine touch key spacing (vertical${\times}$horizontal; $0{\times}0$, $0{\times}1$, $0{\times}3$, $1{\times}0$, $1{\times}1$, $1{\times}3$, $3{\times}0$, $3{\times}1$, $3{\times}3mm$). The completion time, error rate, control discomfort and identification discomfort were measured. The touch key size $7{\times}7$, $7{\times}5$ and the touch key spacing $3{\times}3$, $1{\times}3$ provided the best results in terms of the completion time and the control discomfort, while the square touch key ($7{\times}7$, $5{\times}5$) provided the best performance for the error rate measure. The result of this study can help ergonomically design the touch interface of the smart watch.

The Smart Contract based Conference Key Distribution Scheme (스마트계약 기반 회의용 키 분배 기법)

  • Yun, Sunghyun
    • Journal of Internet of Things and Convergence
    • /
    • v.6 no.4
    • /
    • pp.1-6
    • /
    • 2020
  • Recently, epidemic of covid-19 causes rapid increase in demand for untact video conferences. In existing server-client based video conference systems such as Zoom, Google Meet, etc., the server generates the conference key and controls the access rights of meeting members and their contents with it. In this case, the server can fabricate or repudiate the meeting. So, the privacy of the meeting members is not guaranteed. It's necessary to make the conference key distribution scheme where all participants can verify the trustfulness without help of the server. The smart contract is the program stored to the blockchain. Its contents cannot be altered due to the property of the blockchain, and everybody can verify the execution results of it. In this study, we propose the smart contract based conference key distribution scheme. The proposed scheme is consisted of smart contract deployment, conference key generation and verification stages. The smart contract replaces the role of existing trustful server and the meeting members can generate the conference key according to the protocols implemented on it. The proposed scheme can be applied to the video conference systems and only the meeting members can access the conference key.

Identity-Based Key Management Scheme for Smart Grid over Lattice

  • Wangke, Yu;Shuhua, Wang
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.17 no.1
    • /
    • pp.74-96
    • /
    • 2023
  • At present, the smart grid has become one of the indispensable infrastructures in people's lives. As a commonly used communication method, wireless communication is gradually, being widely used in smart grid systems due to its convenient deployment and wide range of serious challenges to security. For the insecurity of the schemes based on large integer factorization and discrete logarithm problem in the quantum environment, an identity-based key management scheme for smart grid over lattice is proposed. To assure the communication security, through constructing intra-cluster and inter-cluster multi-hop routing secure mechanism. The time parameter and identity information are introduced in the relying phase. Through using the symmetric cryptography algorithm to encrypt improve communication efficiency. Through output the authentication information with probability, the protocol makes the private key of the certification body no relation with the distribution of authentication information. Theoretic studies and figures show that the efficiency of keys can be authenticated, so the number of attacks, including masquerade, reply and message manipulation attacks can be resisted. The new scheme can not only increase the security, but also decrease the communication energy consumption.

Vulnerability analysis of smart key for vehicle and countermeasure against hacking attack (차량용 스마트키 취약점 분석과 해킹공격 대응방안)

  • Kim, Seung-woo;Park, Dea-woo
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2017.10a
    • /
    • pp.302-305
    • /
    • 2017
  • With the development of new ICT technology, new technologies are being applied to automobiles. The smart key for vehicles is also a device to which ICT new technology is applied. Therefore, a cyber-hacking attack against a smart key of a vehicle is possible. The cyber attack on the smart key can cause an abnormal control of the vehicle. Vehicle control can lead to vehicle hijacking and vehicle control risks. In this paper, we analyze the vulnerability of smart key for vehicle. Analyze cyber attacks against smart keys in vehicles. Then, we conduct real hacking attacks on smart keys for vehicles and propose countermeasures. We conduct a hacking attack against the smart key for vehicle that has devised countermeasures and analyze countermeasures against cyber attack security. This paper will contribute to the prevention of vehicle deodorization and to the safety of the people.

  • PDF