• Title/Summary/Keyword: Ubiquitous Control

Search Result 656, Processing Time 0.039 seconds

MANET Certificate Model Using Distributed Partial-Certificate with Cooperation of Cluster Member Node (MANET 환경 하에서 멤버 노드간의 협력에 의해 분산된 인증서를 이용한 인증서비스에 관한 연구)

  • Lee, Dae-Young;Song, Sang-Hoon;Bae, Sang-Hyun
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.11 no.1
    • /
    • pp.206-215
    • /
    • 2007
  • Ad-Hoc network technology is a mobile internet technology of the future that will be used widely not only in Mobile Network but also in Wireless Personal Area Network (WPAN) and Ubiquitous Network For this to occur, distributed routing protocol design, loop prevention for link information reduction in overhead for control messages and route restoration algorithm must be improved or complemented. Security techniques that can guarantee safe com-munication between Ad-Hot nodes net also be provided. This study proposes and evaluates a new authentication mechanism for MANET. The mechanism segregates the roles of certification authority to keep with the dynamic mobility of nodes and handle rapid and random topological changes with minimal over-head. That is, this model is characterized by its high expandability that allows the network to perform authentication service without the influence of joining and leaving nodes. The efficiency and security of this concept was evaluated through simulation.

Cloud Computing : An Analysis of Security Vulnerabilities in managerial aspect (클라우드 컴퓨팅 : 관리적 측면에서의 보안 취약점 분석)

  • Choi, Chang-Ho;Lee, Young Sil;Lee, Hoon Jae
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2014.05a
    • /
    • pp.291-294
    • /
    • 2014
  • By building an environment that can utilize big data, many companies are interested in the cloud computing technology that has increased its popularity recently. By developing cloud environments from existing virtual environments, in the process, we discovered a variety of security vulnerabilities such as management, virtual machines, hypervisors, hardware etc. The security techniques from administrative aspects in the cloud environment provide the environment which can securely store data by the identification and control of security threats. In this paper, we investigate a list of companies which supports the cloud services and the types of services, and analyze the security threats according to the administrative aspects in the cloud environment. In addition, we suggest the direction for future improvements by investigating accidents or incidents which occurred recently.

  • PDF

The Improvement of Disaster Safety Network using ICT Devices (ICT 기기를 활용한 재난안전통신망 강화 방안)

  • Hong, Sung-Hwa
    • Journal of Advanced Navigation Technology
    • /
    • v.23 no.2
    • /
    • pp.194-199
    • /
    • 2019
  • Natural disasters destroy decades of human effort and investments, thereby placing new demands on society for reconstruction and rehabilitation. In most case, the natural phenomena triggering the disasters are beyond human control. In order to solve the problems that the information resources can not be shared among disaster management sectors and their work is hard to be coordinated in city, an idea of application of ubiquitous sense network and ICT technology to model the architecture of the disaster prevention system based on the analysis of characteristics of disasters. The proposed algorithm simulated that it is possible to locate the terminal by linking the direction angle and the estimated position that can be confirmed at the time of stopping, even if the movement direction of the terminal does not move in a certain direction with only a smaller number of mobile base stations. We also confirmed that the proposed algorithms analyzed through simulation are more efficient than existing algorithms.

A Study on RFID Privacy Protection in Insecure Channel (안전하지 않은 채널에서의 RFID 프라이버시 보호에 관한 연구)

  • Park Jang-Su;Lee Im-Yeong
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.16 no.3
    • /
    • pp.77-86
    • /
    • 2006
  • As a core technology in the ubiquitous environment, RFID (Radio Frequency Identification) technology takes an important role. RFID technology provides various information about objects or surrounding environment by attaching a small electronic tag on the object, thus, it means the remote control recognition technology. However, the problems which never happened before can be generated on the point of security and privacy due to the feature that RFID technology can recognize the object without any physical contact. In order to solve these problems, many studies for the RFID recognition technology are going on the progress. The currently running study is the secure communication channel between database and reader applying the recognition technology in the insecure communication channel between reader and tag. But, the purpose of this paper is to settle a privacy problem, which is insecurity of communication between database and reader channel by suggesting providing a user with authentication protocol in order to give information to an authorized entity.

Securing Sensitive Data in Cloud Storage (클라우드 스토리지에서의 중요데이터 보호)

  • Lee, Shir-Ly;Lee, Hoon-Jae
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2011.04a
    • /
    • pp.871-874
    • /
    • 2011
  • The fast emerging of network technology and the high demand of computing resources have prompted many organizations to outsource their storage and computing needs. Cloud based storage services such as Microsoft's Azure and Amazon's S3 allow customers to store and retrieve any amount of data, at anytime from anywhere via internet. The scalable and dynamic of the cloud storage services help their customer to reduce IT administration and maintenance costs. No doubt, cloud based storage services brought a lot of benefits to its customer by significantly reducing cost through optimization increased operating and economic efficiencies. However without appropriate security and privacy solution in place, it could become major issues to the organization. As data get produced, transferred and stored at off premise and multi tenant cloud based storage, it becomes vulnerable to unauthorized disclosure and unauthorized modification. An attacker able to change or modify data while data inflight or when data is stored on disk, so it is very important to secure data during its entire life-cycle. The traditional cryptography primitives for the purpose of data security protection cannot be directly adopted due to user's lose control of data under off premises cloud server. Secondly cloud based storage is not just a third party data warehouse, the data stored in cloud are frequently update by the users and lastly cloud computing is running in a simultaneous, cooperated and distributed manner. In our proposed mechanism we protect the integrity, authentication and confidentiality of cloud based data with the encrypt- then-upload concept. We modified and applied proxy re-encryption protocol in our proposed scheme. The whole process does not reveal the clear data to any third party including the cloud provider at any stage, this helps to make sure only the authorized user who own corresponding token able to access the data as well as preventing data from being shared without any permission from data owner. Besides, preventing the cloud storage providers from unauthorized access and making illegal authorization to access the data, our scheme also protect the data integrity by using hash function.

A Study on the Application of RTLS Technology for the Automation of Spray-Applied Fire Resistive Covering Work (뿜칠내화피복 작업 자동화시스템을 위한 RTLS 기술 적용에 관한 연구)

  • Kim, Kyoon-Tai
    • Journal of the Korea Institute of Building Construction
    • /
    • v.9 no.5
    • /
    • pp.79-86
    • /
    • 2009
  • In a steel structure, spray-applied fire resistive materials are crucial in preventing structural strength from being weakened in the event of a fire. The quality control of such materials, however, is difficult for manual workers, who can frequently be in short supply. These skilled workers are also very likely to be exposed to environmental hazards. Problems with construction work such as this, which are specifically the difficulty of achieving quality control and the dangerous nature of the work itself, can be solved to some degree by the introduction of automated equipment. It is, however, very difficult to automate the work process, from operation to the selection of a location for the equipment, as the environment of a construction site has not yet been structured to accommodate automation. This is a fundamental study on the possibility of the automation of spray-applied fire resistive coating work. In this study, the linkability of the cutting-edge RTLS to an automation system is reviewed, and a scenario for the automation of spray-applied fire resistive coating work and system composition is presented. The system suggested in this study is still in a conceptual stage, and as such, there are many restrictions still to be resolved. Despite this fact, automation is expected to have good effectiveness in terms of preventing fire from spreading by maintaining a certain level of strength at a high temperature when a fire occurs, as it maintains the thickness of the fire-resistive coating at a specified level, and secures the integrity of the coating with the steel structure, thereby enhancing the fire-resistive performance. It also expected that if future research is conducted in this area in relation to a cutting-edge monitoring TRS, such as the ubiquitous sensor network (USN) and/or building information model (BIM), it will contribute to raising the level of construction automation in Korea, reducing costs through the systematic and efficient management of construction resources, shortening construction periods, and implementing more precise construction

A Study on the RFID's Application Environment and Application Measure for Security (RFID의 보안업무 적용환경과 적용방안에 관한 연구)

  • Chung, Tae-Hwang
    • Korean Security Journal
    • /
    • no.21
    • /
    • pp.155-175
    • /
    • 2009
  • RFID that provide automatic identification by reading a tag attached to material through radio frequency without direct touch has some specification, such as rapid identification, long distance identification and penetration, so it is being used for distribution, transportation and safety by using the frequency of 125KHz, 134KHz, 13.56MHz, 433.92MHz, 900MHz, and 2.45GHz. Also it is one of main part of Ubiquitous that means connecting to net-work any time and any place they want. RFID is expected to be new growth industry worldwide, so Korean government think it as prospective field and promote research project and exhibition business program to linked with industry effectively. RFID could be used for access control of person and vehicle according to section and for personal certify with password. RFID can provide more confident security than magnetic card, so it could be used to prevent forgery of register card, passport and the others. Active RFID could be used for protecting operation service using it's long distance date transmission by application with positioning system. And RFID's identification and tracking function can provide effective visitor management through visitor's register, personal identification, position check and can control visitor's movement in the secure area without their approval. Also RFID can make possible of the efficient management and prevention of loss of carrying equipments and others. RFID could be applied to copying machine to manager and control it's user, copying quantity and It could provide some function such as observation of copy content, access control of user. RFID tag adhered to small storage device prevent carrying out of item using the position tracking function and control carrying-in and carrying-out of material efficiently. magnetic card and smart card have been doing good job in identification and control of person, but RFID can do above functions. RFID is very useful device but we should consider the prevention of privacy during its application.

  • PDF

Development and Performance Test of Gas Safety Management System based on the Ubiquitous Home (u-home 가스안전관리시스템 개발 및 성능시험)

  • Park, Gyou-Tae;Lyu, Geun-Jun;Kim, Young-Gyu;Kim, Yeong-Dae;Jee, Cha-Wan;Kwon, Jong-Won;Kim, Hie-Sik
    • Journal of the Institute of Electronics Engineers of Korea SC
    • /
    • v.48 no.3
    • /
    • pp.13-20
    • /
    • 2011
  • In this paper, we proposed a system to raise gas safety management by using the wireless communication module and intelligent gas safety appliances. Our designed systems configure a micom-gas meter, an automatic extinguisher, sensors, and a wallpad. A micom-gas-meter monitors gas flow, gas pressure, and earthquake. An automatic fire extinguisher checks gas(combustible) leaks and temperature of $100^{\circ}C$ and $130^{\circ}C$. Sensors measure smoke and CO gas. In our novel system, a micom-gas meter cut off inner valve with warnings, an automatic fire extinguisher cut off middle valve and spray extinguishing materials, and sensors generate signals for smoke and CO when occurring gas risk. Gas safety appliances and sensors takes safety measures, and transmit those signal to a wallpad. The wallpad again transmit signal like events to a control server. Users can connect web pages for gas safety through B-ISDN and control and manage them. We hereby devised scenarios for gas safety and risk management, and demonstrated their effectiveness through experiments.

Bio-Signal Detection Monitoring System Using ZigBee and Wireless Network (ZigBee와 무선 네트워크를 이용한 생체신호 검출 모니터링 시스템)

  • Kim, Kuk-Se;Bang, Sun-Kwang;Lee, Jeong-Gi;Ahn, Seong-Soo;Lee, Joon
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2007.10a
    • /
    • pp.477-481
    • /
    • 2007
  • The emergency patient who occurs from the place where it is various the control which is quick must come to accomplish in Ubiquitous environment. In the body of the patient or the old person the organism signal sensor about under attaching condition of the patient at real-time about under the monitor ring about under disposing the control which is quick against the emergency patient does to become accomplished at the case real-time when the above will get in the body of the patient or the old person. Using ZigBee (802.15.4) system base on Shor wireless communication protocol because of complement wireless of hospital. This system use ZigBee (802.15.4) system to get for electrocardiogram, blood pressure and pulse bio-sensors. This paper constructs Bio-Sensor communication monitoring system and transmission rate and the delay which it follows possibility and node occurrence rate of wireless sensor network construction hour transmission session it leads and it verifies the effectiveness.

  • PDF

The Change of Glutathione Metabolism in Liver and Kidney of Cisplatin treated Rats (Cisplatin 투여 후 백서의 간 및 신장에서 Glutathione 대사의 변화)

  • Kim, Seong-Yong;Chung, Jae-Yong;Kim, Jae-Ryong;Kim, Jung-Hye
    • Journal of Yeungnam Medical Science
    • /
    • v.11 no.2
    • /
    • pp.262-269
    • /
    • 1994
  • Glutathione (GSH) is a well-known antioxidative cellular component which is ubiquitous in nature. Several enzymes involved in GSH metabolism and recycling have been found to play important roles in detoxification of xenobiotics and free radicals. In this study, total GSH content, activity of GSH peroxidase and GSH reductase were measured in liver and kidney of cisplatin treated rats. Total GSH content (mM/g protein) of liver was higher in cisplatin treated rats ($1.51{\pm}0.28$) than of nontreated control ($0.95{\pm}0.28$), and in kidney, it was also higher in cisplatin treated rats ($0.87{\pm}0.20$) than that of control ($0.68{\pm}0.14$). The activity of GSH peroxidase (${\mu}M/mg$ protein/min) was lower in liver of cisplatin treated rats ($348.0{\pm}18.54$) than that of control ($415.5{\pm}53.15$), in kidney it was increase din cisplatin treated rats ($380.5{\pm}51.86$) compared to control ($327.3{\pm}20.36$). The activity of GSH reductase (${\mu}M/mg$ protein/min) was higher in liver of cisplatin treated rats ($3.09{\pm}0.88$) than that of control ($2.28{\pm}0.61$), in kidney it was also higher in cisplatin treated rats ($8.50{\pm}2.62$) than that of control ($3.30{\pm}1.10$). In summary, detoxification of ciplatin was revealed lesser effect in kidney as show increasion of GSH peroxidase and reductase and detoxification of cisplatin was expressed effectively in liver by increasing of GSH content and decreasing GSH peroxidase.

  • PDF