• Title/Summary/Keyword: 개인위치기반

Search Result 487, Processing Time 0.027 seconds

RFID Security Authentication Protocol for the Ubiquitous Environment (유비쿼터스 환경을 위한 RFID 보안 인증 프로토콜)

  • Bae, Woo-Sik;Choi, Shin-Hyeong;Han, Kun-Hee
    • Journal of the Korea Society of Computer and Information
    • /
    • v.12 no.4
    • /
    • pp.69-75
    • /
    • 2007
  • On the wireless communication between RFID Tag and Reader, there are some existing problems with weaknesses of security such as spoofing, replay, traffic analysis, position tracking, etc., in the established hash lock related algorithm. This paper has presented the comparison and analysis of the established hash lock related algorithm for privacy and in order to make up for this, also suggested a new security authentication algorithm based on hash which has an authentication protocol and creates hash function by using random numbers received from the reader on real time and every session. The algorithm suggested here can offer a several of usefulness for RFID authentication system and it has an advantage to reduce the amount of calculations compared to established algorithm. It also uses the tags needed among a lot of tags around which are expected later and it is expected to reduce a responsibility of the server by ending unnecessary tags' operation with time based.

  • PDF

A Study of a Secure Smart Car System using Attribute-based Delegation Method (속성 기반 권한위임 관리 기법을 사용한 스마트 자동차 안전성 검토에 관한 연구)

  • Kim, Jin-Mook;Moon, Jeong-Kyung;Hwang, Deuk-Young
    • Convergence Security Journal
    • /
    • v.19 no.3
    • /
    • pp.71-79
    • /
    • 2019
  • The demand of smart cars is increasing rapidly. International stand organize such as 3GPP and 5GAA are proposing standard communication protocvols for connected-car, and automotive network infrastructure. But Smart car network have many security threats and more dangerous against the existed wire communication network. Typically, peripheral devices of a smart car may disguise their identity and steal location information and personal information about the vehicle. In addition, the infrastructure elements around smart cars can conspire and put driving cars in danger, threatening lives. This is a very serious security threat. Therefore, in order to solve these problems, we proposed a system that is secure from collusion and tampering attacks using attribute-based authorize delegation method and threshold encryption algorithms. We have demonstrated using a semantic safety model that the proposed system can be safe from collusion attack.

Methodology of Extraction of Crime Vulnerable Areas Through Grid-based Analysis (격자망분석을 통한 범죄발생 취약지역 추출 기법)

  • Park, Jin Yi;Kim, Eui Myoung
    • Journal of the Korean Society of Surveying, Geodesy, Photogrammetry and Cartography
    • /
    • v.33 no.4
    • /
    • pp.221-229
    • /
    • 2015
  • The urban crimes that threat individual's safety are parts of the serious social problems. However. the information of crime in Korea has only been provided by forms of hot spots around place of crime, or forms of crime statistics without positional information. Those could not provide enough information to users in identifying the vulnerable areas for substantive crimes. Therefore, this study suggested a methodology of extraction in criminal vulnerable areas by using the spatial information, the statistical information and the public sector information. The crime vulnerable areas were extracted through the grid-based spatial analysis and the overlapping analysis from each of the information. In fact, the extracted areas were able to provide detailed vulnerability information than the traditional hot spot-based crime information. Following the study, the extracted results in crime vulnerable areas have displayed highly coincide with Korea safety map, provided by national disaster management institute, which regards to be able to provide crime risk rating in terms of administrative business in future.

Deep Learning Model for Mental Fatigue Discrimination System based on EEG (뇌파기반 정신적 피로 판별을 위한 딥러닝 모델)

  • Seo, Ssang-Hee
    • Journal of Digital Convergence
    • /
    • v.19 no.10
    • /
    • pp.295-301
    • /
    • 2021
  • Individual mental fatigue not only reduces cognitive ability and work performance, but also becomes a major factor in large and small accidents occurring in daily life. In this paper, a CNN model for EEG-based mental fatigue discrimination was proposed. To this end, EEG in the resting state and task state were collected and applied to the proposed CNN model, and then the model performance was analyzed. All subjects who participated in the experiment were right-handed male students attending university, with and average age of 25.5 years. Spectral analysis was performed on the measured EEG in each state, and the performance of the CNN model was compared and analyzed using the raw EEG, absolute power, and relative power as input data of the CNN model. As a result, the relative power of the occipital lobe position in the alpha band showed the best performance. The model accuracy is 85.6% for training data, 78.5% for validation, and 95.7% for test data. The proposed model can be applied to the development of an automated system for mental fatigue detection.

Service Platform of Regional Smart Tour Ecosystem Support (지역중심의 스마트관광 생태계 지원 서비스 플랫)

  • Weon, Dalsoo
    • The Journal of the Convergence on Culture Technology
    • /
    • v.4 no.4
    • /
    • pp.31-36
    • /
    • 2018
  • The tourism industry has a great influence on national economy activation. The development of IT technology has enabled the collection and analysis of personal profile information, location information and activity information based on the characteristics, behavior, purchase propensity and interest of tourists. In order to realize this, the implementation of convergence smart tourism information service platform is completed by developing business model, IoT & Big Data integration management system, big data algorithm development and analysis platform in three stages. The underlying technology of the platform and algorithm needs a process of adopting open source, expanding the service element on the basis of it, and then complementing the problem through the test-bed demonstration test that connects the area. Using this platform, it is possible to develop a smart tourism environment that can provide customized services for each tourist by analyzing various information in an integrated manner. Also, it will be possible to improve the life of tourist destination residents and contribute to regional revitalization and job creation through the creation of smart tourism ecosystem focused on the region.

A Trip Mobility Analysis using Big Data (빅데이터 기반의 모빌리티 분석)

  • Cho, Bumchul;Kim, Juyoung;Kim, Dong-ho
    • The Journal of Bigdata
    • /
    • v.5 no.2
    • /
    • pp.85-95
    • /
    • 2020
  • In this study, a mobility analysis method is suggested to estimate an O/D trip demand estimation using Mobile Phone Signaling Data. Using mobile data based on mobile base station location information, a trip chain database was established for each person and daily traffic patterns were analyzed. In addition, a new algorithm was developed to determine the traffic characteristics of their mobilities. To correct the ping pong handover problem of communication data itself, the methodology was developed and the criteria for stay time was set to distinguish pass by between stay within the influence area. The big-data based method is applied to analyze the mobility pattern in inter-regional trip and intra-regional trip in both of an urban area and a rural city. When comparing it with the results with traditional methods, it seems that the new methodology has a possibility to be applied to the national survey projects in the future.

The Individual Discrimination Location Tracking Technology for Multimodal Interaction at the Exhibition (전시 공간에서 다중 인터랙션을 위한 개인식별 위치 측위 기술 연구)

  • Jung, Hyun-Chul;Kim, Nam-Jin;Choi, Lee-Kwon
    • Journal of Intelligence and Information Systems
    • /
    • v.18 no.2
    • /
    • pp.19-28
    • /
    • 2012
  • After the internet era, we are moving to the ubiquitous society. Nowadays the people are interested in the multimodal interaction technology, which enables audience to naturally interact with the computing environment at the exhibitions such as gallery, museum, and park. Also, there are other attempts to provide additional service based on the location information of the audience, or to improve and deploy interaction between subjects and audience by analyzing the using pattern of the people. In order to provide multimodal interaction service to the audience at the exhibition, it is important to distinguish the individuals and trace their location and route. For the location tracking on the outside, GPS is widely used nowadays. GPS is able to get the real time location of the subjects moving fast, so this is one of the important technologies in the field requiring location tracking service. However, as GPS uses the location tracking method using satellites, the service cannot be used on the inside, because it cannot catch the satellite signal. For this reason, the studies about inside location tracking are going on using very short range communication service such as ZigBee, UWB, RFID, as well as using mobile communication network and wireless lan service. However these technologies have shortcomings in that the audience needs to use additional sensor device and it becomes difficult and expensive as the density of the target area gets higher. In addition, the usual exhibition environment has many obstacles for the network, which makes the performance of the system to fall. Above all these things, the biggest problem is that the interaction method using the devices based on the old technologies cannot provide natural service to the users. Plus the system uses sensor recognition method, so multiple users should equip the devices. Therefore, there is the limitation in the number of the users that can use the system simultaneously. In order to make up for these shortcomings, in this study we suggest a technology that gets the exact location information of the users through the location mapping technology using Wi-Fi and 3d camera of the smartphones. We applied the signal amplitude of access point using wireless lan, to develop inside location tracking system with lower price. AP is cheaper than other devices used in other tracking techniques, and by installing the software to the user's mobile device it can be directly used as the tracking system device. We used the Microsoft Kinect sensor for the 3D Camera. Kinect is equippedwith the function discriminating the depth and human information inside the shooting area. Therefore it is appropriate to extract user's body, vector, and acceleration information with low price. We confirm the location of the audience using the cell ID obtained from the Wi-Fi signal. By using smartphones as the basic device for the location service, we solve the problems of additional tagging device and provide environment that multiple users can get the interaction service simultaneously. 3d cameras located at each cell areas get the exact location and status information of the users. The 3d cameras are connected to the Camera Client, calculate the mapping information aligned to each cells, get the exact information of the users, and get the status and pattern information of the audience. The location mapping technique of Camera Client decreases the error rate that occurs on the inside location service, increases accuracy of individual discrimination in the area through the individual discrimination based on body information, and establishes the foundation of the multimodal interaction technology at the exhibition. Calculated data and information enables the users to get the appropriate interaction service through the main server.

Multi User-Authentication System using One Time-Pseudo Random Number and Personal DNA STR Information in RFID Smart Card (RFID 스마트카드내 DNA STR Information과 일회용 의사난수를 사용한 다중 사용자 인증시스템)

  • Sung, Soon-Hwa;Kong, Eun-Bae
    • The KIPS Transactions:PartC
    • /
    • v.10C no.6
    • /
    • pp.747-754
    • /
    • 2003
  • Thia paper suggests a milti user-authentication system comprises that DNA biometric informatiom, owner's RFID(Radio Frequency Identification) smartcard of hardware token, and PKI digital signqture of software. This system improved items proposed in [1] as follows : this mechanism provides one RFID smartcard instead of two user-authentication smartcard(the biometric registered seal card and the DNA personal ID card), and solbers user information exposure as RFID of low proce when the card is lost. In addition, this can be perfect multi user-autentication system to enable identification even in cases such as identical twins, the DNA collected from the blood of patient who has undergone a medical procedure involving blood replacement and the DNA of the blood donor, mutation in the DNA base of cancer cells and other cells. Therefore, the proposed system is applied to terminal log-on with RFID smart card that stores accurate digital DNA biometric information instead of present biometric user-authentication system with the card is lost, which doesn't expose any personal DNA information. The security of PKI digital signature private key can be improved because secure pseudo random number generator can generate infinite one-time pseudo randon number corresponding to a user ID to keep private key of PKI digital signature securely whenever authenticated users access a system. Un addition, this user-authentication system can be used in credit card, resident card, passport, etc. acceletating the use of biometric RFID smart' card. The security of proposed system is shown by statistical anaysis.

Geographical Characteristics and Patients' Determinants of Online Referrals : A Case Study of Choongbook, Korea (온라인 협진에 대한 지리적 특성과 환자의 결정에 관한 연구 : 충청북도 사례를 중심으로)

  • Park, Soo-Kyung
    • Journal of the Korean association of regional geographers
    • /
    • v.17 no.5
    • /
    • pp.617-637
    • /
    • 2011
  • This study employs qualitative approaches to examining geographical characteristics and patients' determinants of online referrals in terms of regionalization. In this light, I conducted interviews with 20 patients receiving online referrals in Choongbook, Korea, and investigated their behaviors regarding these referrals between July and August 2009. I found that many patients who suffered from various levels of illness preferred tertiary care centers outside of Choongbook and did not enjoy their experience with the local medical institutions as the online referral service sites. This result might be because patients choose online referrals for psychological considerations such as quality and level of health care services, personal stakes in online referral service sites, acceptability and credibility of good tertiary care centers, and easy access to and use of medical institutions. Meanwhile, immediate benefits with regard to the technological value of online referrals, such as convenience, utility, and original purpose associated with regionalization, did not influence patients' decision-making. Therefore, the social and public networks affiliated with online referrals plus the effect of Korean medical laws play hostage to private decisions made by citizens, who prefer high-level medical institutions. Accordingly, the technological contribution of online referrals does not halt the outflow of patients from local, tertiary care centers. Especially, the existing health care system and patients' behaviors are deeply related to referrals in the online system. To protect regionalization, the improvement of health care services from the present state of affairs is required.

  • PDF

Design of Optimized pRBFNNs-based Face Recognition Algorithm Using Two-dimensional Image and ASM Algorithm (최적 pRBFNNs 패턴분류기 기반 2차원 영상과 ASM 알고리즘을 이용한 얼굴인식 알고리즘 설계)

  • Oh, Sung-Kwun;Ma, Chang-Min;Yoo, Sung-Hoon
    • Journal of the Korean Institute of Intelligent Systems
    • /
    • v.21 no.6
    • /
    • pp.749-754
    • /
    • 2011
  • In this study, we propose the design of optimized pRBFNNs-based face recognition system using two-dimensional Image and ASM algorithm. usually the existing 2 dimensional face recognition methods have the effects of the scale change of the image, position variation or the backgrounds of an image. In this paper, the face region information obtained from the detected face region is used for the compensation of these defects. In this paper, we use a CCD camera to obtain a picture frame directly. By using histogram equalization method, we can partially enhance the distorted image influenced by natural as well as artificial illumination. AdaBoost algorithm is used for the detection of face image between face and non-face image area. We can butt up personal profile by extracting the both face contour and shape using ASM(Active Shape Model) and then reduce dimension of image data using PCA. The proposed pRBFNNs consists of three functional modules such as the condition part, the conclusion part, and the inference part. In the condition part of fuzzy rules, input space is partitioned with Fuzzy C-Means clustering. In the conclusion part of rules, the connection weight of RBFNNs is represented as three kinds of polynomials such as constant, linear, and quadratic. The essential design parameters (including learning rate, momentum coefficient and fuzzification coefficient) of the networks are optimized by means of Differential Evolution. The proposed pRBFNNs are applied to real-time face image database and then demonstrated from viewpoint of the output performance and recognition rate.