• Title/Summary/Keyword: Ubiquitous Protect

Search Result 81, Processing Time 0.024 seconds

A Study on Privacy Protect Scheme of RFID Provide Synchronization using Random Number (난수를 이용하여 동기화를 제공하는 RFID 프라이버시 보호 기법에 관한 연구)

  • Kang, Soo-Young;Lee, Im-Yeong
    • Journal of Korea Multimedia Society
    • /
    • v.10 no.5
    • /
    • pp.623-630
    • /
    • 2007
  • With the development in IT technology and with growing demands of users, a ubiquitous environment is being made. Because of individuals identification is important in ubiquitous environment, RFID, a technology used frequently. RFID, a technology that radio frequency identification, reader send signer, then tag provide user information. RFID has various strengths, such as high recognition rates, quick recognition speed, but Eavesdropping is possible and problem that user information is revealed happens. To solve this, study is proceeded with activity, but, because of low-cost passive tag is limited operation capability, usually used hash function and random number. Also updates value that is used to present session and uses in next session. Therefore, this scheme protects user privacy using random number. And this sheme can offer synchronization by creating variable value without updating value.

  • PDF

Security Model for Pervasive Multimedia Environment

  • Djellali, Benchaa;Lorenz, Pascal;Belarbi, Kheira;Chouarfia, Abdallah
    • Journal of Multimedia Information System
    • /
    • v.1 no.1
    • /
    • pp.23-43
    • /
    • 2014
  • With the rapidity of the development on electronic technology, various mobile devices are produced to make human life more convenient. The user is always in constant search of middle with ease of deployment. Therefore, the development of infrastructure and application with ubiquitous nature gets a growing keen interest. Recently, the number of pervasive network services is expanding into ubiquitous computing environment. To get desired services, user presents personal details about this identity, location and private information. The information transmitted and the services provided in pervasive computing environments (PCEs) are exposed to eavesdropping and various attacks. Therefore, the need to protect this environment from illegal accesses has become extremely urgent. In this paper, we propose an anonymous authentication and access control scheme to secure the interaction between mobile users and services in PCEs. The proposed scheme integrates a biometric authentication in PKI model. The proposed authentication aims to secure access remote in PCE for guaranteeing reliability and availability. Our authentication concept can offer pervasive network service users convenience and security.

  • PDF

Assessment of a smartphone-based monitoring system and its application

  • Ahn, Hoyong;Choi, Chuluong;Yu, Yeon
    • Korean Journal of Remote Sensing
    • /
    • v.30 no.3
    • /
    • pp.383-397
    • /
    • 2014
  • Information technology advances are allowing conventional surveillance systems to be combined with mobile communication technologies, creating ubiquitous monitoring systems. This paper proposes monitoring system that uses smart camera technology. We discuss the dependence of interior orientation parameters on calibration target sheets and compare the accuracy of a three-dimensional monitoring system with camera location calculated by space resectioning using a Digital Surface Model (DSM) generated from stereo images. A monitoring housing is designed to protect a camera from various weather conditions and to provide the camera for power generated from solar panel. A smart camera is installed in the monitoring housing. The smart camera is operated and controlled through an Android application. At last the accuracy of a three-dimensional monitoring system is evaluated using a DSM. The proposed system was then tested against a DSM created from ground control points determined by Global Positioning Systems (GPSs) and light detection and ranging data. The standard deviation of the differences between DSMs are less than 0.12 m. Therefore the monitoring system is appropriate for extracting the information of objects' position and deformation as well as monitoring them. Through incorporation of components, such as camera housing, a solar power supply, the smart camera the system can be used as a ubiquitous monitoring system.

A Study on RFID Authentication Protocol suitable for Ubiquitous Computing (유비쿼터스 컴퓨팅 환경에 적합한 RFID 인증 프로토콜에 관한 연구)

  • Yang Hyungkyu;An YoungHwa
    • Journal of the Institute of Electronics Engineers of Korea CI
    • /
    • v.42 no.1
    • /
    • pp.45-50
    • /
    • 2005
  • Recently, ubiquitous Computing is being actively researched and one of the main technology in ubiquitous computing environments is recognized as RFID system. The RFID system has much benefits but simultaneously has some problems such as user's privacy violation. Therefore, in this paper, we analyze the privacy problems of previous methods and propose more secure and effective authentication method to protect user's privacy. The proposed protocol is secure against replay attack, spoofing attack and tracking by an attacker.

A Study on the Revitalization Ubiquitous Information Technology for the Disaster Management (재난관리를 위한 유비쿼터스 정보기술 활성화 방안)

  • Chae, Jin;Song, Yong-Sun
    • Fire Science and Engineering
    • /
    • v.23 no.6
    • /
    • pp.24-31
    • /
    • 2009
  • The Environment of disaster has more complicated, diversified and unpredicted sides, which causes extensive damage to humankind. Above all, presently the climatic change causes worldwide disaster of nature like cataclysm, intense heat, drought, earthquake and hard winter. After 9.11, most of countries continuously try to protect their own compatriots' life and property which forms the social safety net as well. This research investigates the current system used by the firerenation which is the national disaster response agency.ict also suggests the unation whiih is the nasystem unationdisaster mthe nasys accundihg to tionld el of disaster like the constructe naof DB, disaster cycld repunt, analysis of danger, facilities ih is ation system, disaster media system, location search system, disaster damage collection system.

Design of Efficient Hacking Prevention Systems Using a Smart Card (스마트카드 기반의 효율적인 해킹 방지 시스템 설계)

  • 황선태;박종선
    • Journal of Information Technology Applications and Management
    • /
    • v.11 no.2
    • /
    • pp.179-190
    • /
    • 2004
  • This paper describes the design of hacking prevention systems using a smart card. It consists of two parts, i.e., PC authentication and Keyboard-buffer hacking prevention. PC authentication function is a procedure to handle the access control to the target PC. The card's serial number is used for PIN(Personal Identification Number) and is converted into hash-code by SHA-1 hash-function to verify the valid users. The Keyboard-buffer hacking prevention function converts the scan codes into the encoded forms using RSA algorithm on the Java Card, and puts them into the keyboard-buffer to protect from illegal hacking. The encoded information in the buffer is again decoded by the RSA algorithm and displayed on the screen. in this paper, we use RSA_PKCS#1 algorithm for encoding and decoding. The reason using RSA technique instead of DES or Triple-DES is for the expansion to multi-functions in the future on PKI. Moreover, in the ubiquitous computing environment, this smart card security system can be used to protect the private information from the illegal attack in any computing device anywhere. Therefore, our security system can protect PC user's information more efficiently and guarantee a legal PC access authority against any illegal attack in a very convenient way.

  • PDF

The privacy protect Method for Private information security of Ubiquitous Network (유비쿼터스 네트워크에서 안전한 개인정보보호를 위한 프라이버시 보호 방안)

  • Kim, Ki-Soo
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2007.10d
    • /
    • pp.132-135
    • /
    • 2007
  • 유선망, 무선망, 통신 방송 융합 등이 이루어진 BcN망은 기존 접속망을 통한 보안성 위협이 나타날 수 있으며, 특히 개방형 망구조로 인해 쉴게 액세스가 용이하므로 공격을 받을 가능성이 높다. 따라서 서비스를 이용하는 사용자들의 개인 프라이버시 유출 위험이 존재하므로, 신뢰성 보장 및 접근 정보의 보호를 지원해주어야 한다. 본 논문에서는 유비쿼터스 네트워크에서 안전한 개인정보보호를 위한 프라이버시 보호방안을 제안하고 있다.

  • PDF

Implementation of Keyboard-hacking Prevention System using a Java Card (자바카드를 이용한 키보드 해킹 방지 시스템 구현)

  • 박종선;황선태
    • Proceedings of the Korea Society for Industrial Systems Conference
    • /
    • 2003.11a
    • /
    • pp.733-746
    • /
    • 2003
  • In this paper, we describe the system which can protect the major information from keyboard-hacking. These days the securing information matters for pc-users are becoming more important as the internet business grows rapidly, and the ubiquitous computing environment is open for everyone. Therefore, the keyboard-inputting information is necessary to be protected properly against the malicious attack. In this paper, we propose the keyboard-hacking prevention system using a Java Card, and show the conveniency and efficiency in the results.

  • PDF

Design of Information Security in Ubiquitous City (u-City에서의 정보보안 설계 방안)

  • Yoon, Seuk-Kyu;Jang, Hee-Seon
    • Convergence Security Journal
    • /
    • v.11 no.4
    • /
    • pp.37-42
    • /
    • 2011
  • In this paper, the design methodology of information security is analyzed to implement the ubiquitous city (u-City). The definition, concept, and main u-services of u-City are presented. The main components, functio ns and offering services of u-City management center are presented, and the laws and network security requirements related to protect the personal information in collecting, processing, and exchanging are also analyzed. Three step security levels of Router/Switch, Firewall/VPN, and IPS are applied where main functions of in terception of abnormal packets($1^{st}$ level), access control for each service($2^{nd}$ level), and real-time network monitoring($3^{rd}$ level) are performed. Finally, application cases are presented to validate the security of personal information in providing the u-City services.

Viewing Path Search and Congestion Control Algorithms For Comfortable Museum Viewing (편안한 박물관 관람을 위한 관람 경로 탐색 및 혼잡제어 알고리즘)

  • Seo, Yoon-Deuk;Ahn, Jin-Ho
    • Journal of Internet Computing and Services
    • /
    • v.11 no.3
    • /
    • pp.131-137
    • /
    • 2010
  • Today, many museums are changing their forms with ubiquitous environment. Unlike traditional museums providing only static text-based information attached to its corresponding artifacts to visitors, those ubiquitous museums provide not only artifacts' text information, but also many different forms of information such as sound or media through personal digital assistance or cell phones. However, these existing ubiquitous museums still provide each visitor only with artifact-centric information in very simple ways. Also this disadvantageous feature causes high gallery congestion problem resulting from providing a uniform path for every visitor. These limitations may be the biggest barrier to providing more various and useful information about artifacts to visitors through considering each visitor's preference. This paper propose a new optimal viewing path search algorithm to provide comfortable museum viewing for each visitor according to its preference. Also, a new congestion control method is developed to protect visitors from being put in some hot spots on their museum viewing, improving its comfort to a maximum.