• Title/Summary/Keyword: Vulnerable User

Search Result 249, Processing Time 0.024 seconds

A Consecutive Motion and Situation Recognition Mechanism to Detect a Vulnerable Condition Based on Android Smartphone

  • Choi, Hoan-Suk;Lee, Gyu Myoung;Rhee, Woo-Seop
    • International Journal of Contents
    • /
    • v.16 no.3
    • /
    • pp.1-17
    • /
    • 2020
  • Human motion recognition is essential for user-centric services such as surveillance-based security, elderly condition monitoring, exercise tracking, daily calories expend analysis, etc. It is typically based on the movement data analysis such as the acceleration and angular velocity of a target user. The existing motion recognition studies are only intended to measure the basic information (e.g., user's stride, number of steps, speed) or to recognize single motion (e.g., sitting, running, walking). Thus, a new mechanism is required to identify the transition of single motions for assessing a user's consecutive motion more accurately as well as recognizing the user's body and surrounding situations arising from the motion. Thus, in this paper, we collect the human movement data through Android smartphones in real time for five targeting single motions and propose a mechanism to recognize a consecutive motion including transitions among various motions and an occurred situation, with the state transition model to check if a vulnerable (life-threatening) condition, especially for the elderly, has occurred or not. Through implementation and experiments, we demonstrate that the proposed mechanism recognizes a consecutive motion and a user's situation accurately and quickly. As a result of the recognition experiment about mix sequence likened to daily motion, the proposed adoptive weighting method showed 4% (Holding time=15 sec), 88% (30 sec), 6.5% (60 sec) improvements compared to static method.

Weaknesses Cryptanalysis of Khan's Scheme and Improved Authentication Scheme preserving User Anonymity (Khan 인증기법의 취약점 분석과 개선된 사용자 익명성 제공 인증기법)

  • Park, Mi-Og
    • Journal of the Korea Society of Computer and Information
    • /
    • v.18 no.2
    • /
    • pp.87-94
    • /
    • 2013
  • In this paper, we analyse the weaknesses of authentication scheme preserving user anonymity proposed by Khan et al in 2011 and we propose a new authentication schemes preserving user anonymity that improved these weaknesses. Khan et al's authentication scheme is vulnerable to insider attack and doesn't provide user anonymity to the server. Also, this scheme is still a weakness of wrong password input by mistake in spite of proposing the password change phase. In this paper, we will show that Khan et al's scheme is vulnerable to the stolen smart card attack and the strong server/user masquerade attack. The proposed authentication scheme propose the improved user anonymity, which can provide more secure privacy to user by improving these weaknesses.

Development of technology to improve information accessibility of information vulnerable class using crawling & clipping

  • Jeong, Seong-Bae;Kim, Kyung-Shin
    • Journal of the Korea Society of Computer and Information
    • /
    • v.23 no.2
    • /
    • pp.99-107
    • /
    • 2018
  • This study started from the public interest purpose to help accessibility for the information acquisition of the vulnerable groups due to visual difficulties such as the elderly and the visually impaired. In this study, the server resources are minimized and implemented in most of the user smart phones. In addition, we implement a method to gather necessary information by collecting only pattern information by utilizing crawl & clipping without having to visit the site of the information of the various sites having the data necessary for the user, and to have it in the server. Especially, we applied the TTS(Text-To-Speech) service composed of smart phone apps and tried to develop a unified customized information collection service based on voice-based information collection method.

A Study on the Priority of Autonomous Driving Service Requirements for the Transportation Vulnerable: Focusing on Wheelchair disabled and Walking disabled Persons (교통약자 자율주행서비스 요구사항에 대한 우선순위 연구: 휠체어 이용 장애인 및 보행 장애인을 중심으로)

  • Seok Hyun Kim;Jeong Ah Jang;Yu Mi Do;Hyun Keun Hong
    • Journal of Information Technology Applications and Management
    • /
    • v.31 no.3
    • /
    • pp.39-52
    • /
    • 2024
  • The development of autonomous driving technology is expected to bring about a major change in the mobility rights of the transportation vulnerable. It is very important to identify user requirements in developing autonomous vehicles and service technologies for the transportation vulnerable. User requirements were derived for the wheelchair disabled and the walking disabled. Through focus interviews, a total of 58 requirements were derived for wheelchair-using disabled people and 53 requirements for walking disabled people. A Kano survey was conducted on 33 wheelchair disabled and 34 walking disabled. After that, the quality types of functional requirements in terms of autonomous vehicles and service environment development were analyzed using the Kano model. Priority analysis was conducted on the functions required by the wheelchair disabled and the walking disabled. The results of this study can be used as basic data to determine the priorities of user function requirements in the early stages of autonomous vehicle and service technology development.

A Study on the Development of Personal Mobility for the Vulnerable Group (취약계층을 위한 개인 이동체 개발 연구)

  • Han, Kwang Ho;Lee, Chul-Hee
    • Journal of Drive and Control
    • /
    • v.18 no.4
    • /
    • pp.35-42
    • /
    • 2021
  • A personal mobility withstanding function for the disabled and vulnerable groups with difficulties in mobility was developed and structural and dynamics analysis was conducted. Personal mobility devices are a very helpful means of transportation for the disabled and vulnerable groups. In addition, the standing function allows individuals to perform a difficult task in while seated and offers a medical advantage to the user. In this study, a personal mobility device was designed and developed to help vulnerable groups and disabled people overcome limited mobility, and communicate with the general people at eye level through standing functions. Through structural and dynamic analysis, the structural safety, optimal speed during rotation, and lateral acceleration of the personal mobility device was analyzed. The analysis results are expected to contribute to the improvement of the users' convenience and stability of personal mobility.

Design Flaws and Cryptanalysis of Cui et al's User Authentication Scheme

  • Park, Mi-Og
    • Journal of the Korea Society of Computer and Information
    • /
    • v.24 no.10
    • /
    • pp.41-48
    • /
    • 2019
  • In 2018, Cui et al proposed a three-factor remote user authentication scheme using biometrics. Cui et al claimed that their authentication scheme is vulnerable to eavesdropping attack, stolen smart card attack, and especially Dos(denial-of-service) attack. Also they claimed that it is safe to password guessing attack, impersonation attack, and anonymity attack. In this paper, however, we analyze Cui et al's authentication scheme and show that it is vulnerable to replay attack, insider attack, stolen smart card attack, and user impersonation attack, etc. In addition, we present the design flaws in Cui et al's authentication scheme as well.

Vision and Lidar Sensor Fusion for VRU Classification and Tracking in the Urban Environment (카메라-라이다 센서 융합을 통한 VRU 분류 및 추적 알고리즘 개발)

  • Kim, Yujin;Lee, Hojun;Yi, Kyongsu
    • Journal of Auto-vehicle Safety Association
    • /
    • v.13 no.4
    • /
    • pp.7-13
    • /
    • 2021
  • This paper presents an vulnerable road user (VRU) classification and tracking algorithm using vision and LiDAR sensor fusion method for urban autonomous driving. The classification and tracking for vulnerable road users such as pedestrian, bicycle, and motorcycle are essential for autonomous driving in complex urban environments. In this paper, a real-time object image detection algorithm called Yolo and object tracking algorithm from LiDAR point cloud are fused in the high level. The proposed algorithm consists of four parts. First, the object bounding boxes on the pixel coordinate, which is obtained from YOLO, are transformed into the local coordinate of subject vehicle using the homography matrix. Second, a LiDAR point cloud is clustered based on Euclidean distance and the clusters are associated using GNN. In addition, the states of clusters including position, heading angle, velocity and acceleration information are estimated using geometric model free approach (GMFA) in real-time. Finally, the each LiDAR track is matched with a vision track using angle information of transformed vision track and assigned a classification id. The proposed fusion algorithm is evaluated via real vehicle test in the urban environment.

Determinants of Satisfaction and Demand for Smart Medical Care in Vulnerable Areas (의료취약지 스마트의료에 대한 만족도와 요구도의 결정요인)

  • Jin, Ki Nam;Han, Ji Eun;Koo, Jun Hyuk
    • Korea Journal of Hospital Management
    • /
    • v.26 no.3
    • /
    • pp.56-67
    • /
    • 2021
  • There are few domestic studies on medical services in medically vulnerable areas where medical use is not met due to a lack of medical resources. The past studies on smart medicine targeting medically vulnerable areas grasp only the overall satisfaction level, or the sub-dimensions of satisfaction are not classified clearly. Also, it lacks consideration of the patient's needs. This study aims to analyze the effect of users' experience of the smart medicine pilot project conducted in medically vulnerable areas on satisfaction and demand. The user's experience was measured by variables in the dimensions of structure, process, and outcome. Among the pilot project participants, 282 subjects responded to the 2019 survey. Using the hierarchical regression method, we tried to find out the determinants of satisfaction and service demands. Experience factors affecting satisfaction were found to be accessibility, certainty, effectiveness, and efficiency. In addition, it was found that the demand in their 60s was high and that accessibility, certainty, effectiveness, and efficiency had a statistically significant effect on the demand. It is expected that the smart medicine pilot project will be effectively operated by well utilizing the factors influencing satisfaction and demand revealed in this study.

Secure Password Authenticated Key Exchange Protocol for Imbalanced Wireless Networks (비대칭 무선랜 환경을 위한 안전한 패스워드 인증 키 교환 프로토콜)

  • Yang, Hyung-Kyu
    • Journal of the Korea Society of Computer and Information
    • /
    • v.16 no.2
    • /
    • pp.173-181
    • /
    • 2011
  • User authentication and key exchange protocols are the most important cryptographic applications. For user authentication, most protocols are based on the users' secret passwords. However, protocols based on the users' secret passwords are vulnerable to the password guessing attack. In 1992, Bellovin and Merritt proposed an EKE(Encrypted Key Exchange) protocol for user authentication and key exchage that is secure against password guessing attack. After that, many enhanced and secure EKE protocols are proposed so far. In 2006, Lo pointed out that Yeh et al.'s password-based authenticated key exchange protocol has a security weakness and proposed an improved protocol. However, Cao and Lin showed that his protocol is also vulnerable to off-line password guessing attack. In this paper, we show his protocol is vulnerable to on-line password guessing attack using new attack method, and propose an improvement of password authenticated key exchange protocol for imbalanced wireless networks secure against password guessing attack.