• Title/Summary/Keyword: 디바이스융합

Search Result 390, Processing Time 0.024 seconds

A Study on Secure Key Management Technology between Heterogeneous Networks in Ubiquitous Computing Environment (유비쿼터스 컴퓨팅 환경에서 이기종 네트워크간 안전한 키 관리 기술에 관한 연구)

  • Moon, Jong-Sik;Lee, Im-Yeong
    • Journal of Korea Multimedia Society
    • /
    • v.11 no.4
    • /
    • pp.504-515
    • /
    • 2008
  • Fast transmission speeds and various wired network services have been combined with the convenience and mobility of wireless services. The combination of wired/wireless technologies is spreading rapidly since it enables the creation of new services and provides new features to both users and service providers. In such wired/wireless integrated services, network integration is very important because such systems are integrated by a linkage between heterogeneous networks and they involve an integration of transmission technologies across networks. In this situation, existing security and communication technologies are unsuitable since the network are integrated with heterogeneous networks. The network may also have several security flaws. In existing homogeneous networks, user authentication and key management between heterogeneous networks are required for these new technologies. The establishment of security technologies for heterogeneous devices is a very important task between homogeneous networks. In this paper, we propose a secure and efficient key management system for a heterogeneous network environment. Our system provides secure communications between heterogeneous network devices.

  • PDF

A Study on Lightweight Blockchain technique for Lightweight IoT Device (경량 IoT 디바이스를 위한 블록체인 경량화 기법 동향)

  • Won-Woong Kim;Yea-Jun Kang;Hwa-Jeong Seo
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2023.05a
    • /
    • pp.256-259
    • /
    • 2023
  • 최근 스마트 시티 등과 같은 이유로 IoT에 대한 관심이 증가하며 이에 대한 보안 솔루션 또한 주목받게 되었다. 이때 블록체인이 보안 솔루션으로써 많은 관심을 받고있지만 확장성에 한계에 의하여 IoT와의 융합에 제한을 받고있는 상황이다. 따라서 이러한 확장성 문제를 해결하기 위한 다양한 기법들이 존재한다. 본 논문에서는 확장성의 한계를 해결하기 위해 블록체인 경량화 기법의 연구 사례에 대하여 알아본다.

Design and Implementation of HAL and Java API for Embedded System (임베디드 시스템을 위한 HAL과 JAVA API 설계 및 구현)

  • Lee, Jin-Kwan;Lee, Dae-Hyung;Jung, Kyu-Cheol;Lee, Jong-Chan;Park, Ki-Hong
    • Convergence Security Journal
    • /
    • v.8 no.1
    • /
    • pp.57-65
    • /
    • 2008
  • The implement of JAVA API for supporting the embedded system is capable of developing the object oriented system with code reuse because the developer is able to use JAVA in the embedded system. The system dependant parts for implementing JAVA API are realized from a native function. In this paper, we devide JAVA API into the platform-independent JAVA part and platform-dependent native part for the implementation of JAVA API to manage the linux based embedded system devices, and focus on the control of the embedded system devices using JAVA API.

  • PDF

A Study on SMiShing Detection Technique using TaintDroid (테인트드로이드를 이용한 스미싱 탐지 기법 연구)

  • Cho, Jiho;Shin, Jiyong;Lee, Geuk
    • Convergence Security Journal
    • /
    • v.15 no.1
    • /
    • pp.3-9
    • /
    • 2015
  • In this paper, a detection technique of smishing using a TaintDroid is suggested. Suggesting system detects malicious acts by transmitting a URL to the TaintDroid server and installing a relevant application to a virtual device of the TaintDroid server, when a smartphone user receives a text message including the URL suspected as a smishing. Through this we want to distinguish an application that can not install because of suspicion of a smishing in an actual smartphone whether said application is malicious application or not by testing with the virtual device of said system. The detection technique of a smishing using the TaintDroid suggested in this paper is possible to detect in a new form a smishing with a text message and to identifying which application it is through analysis of results from a user.

Implementation of Optimized 1st-Order Masking AES Algorithm Against Side-Channel-Analysis (부채널 분석 대응을 위한 1차 마스킹 AES 알고리즘 최적화 구현)

  • Kim, Kyung Ho;Seo, Hwa Jeong
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.8 no.9
    • /
    • pp.225-230
    • /
    • 2019
  • Recently, with the development of Internet technology, various encryption algorithms have been adopted to protect the sensing data measured by hardware devices. The Advanced Encryption Standard (AES), the most widely used encryption algorithm in the world, is also used in many devices with strong security. However, it has been found that the AES algorithm is vulnerable to side channel analysis attacks such as Differential Power Analysis (DPA) and Correlation Power Analysis (CPA). In this paper, we present a software optimization implementation technique of the AES algorithm applying the most widely known masking technique among side channel analysis attack methods.

Reliability-based Message Transmission System in Healthcare Devices (헬스케어 디바이스에서의 신뢰성 기반 메시지 전달 시스템)

  • Lee, Young-Dong
    • Journal of the Institute of Convergence Signal Processing
    • /
    • v.21 no.3
    • /
    • pp.142-147
    • /
    • 2020
  • The Internet of Things is valuable as a means of solving social problems such as personal, public, and industrial. Recently, the application of IoT technology to the healthcare industry is increasing. It is important to ensure reliability and security in IoT-based healthcare services. Communication protocols, wireless transmit/receive techniques, and reliability-based message delivery are essential elements in IoT healthcare devices. The system was designed and implemented to measure body temperature and activity through body temperature and acceleration sensors and deliver them to the oneM2M-based Mobius platform.

저사양 사물인터넷 디바이스를 위한 블록체인 기술 동향

  • Heo, ShinWook;Jo, Uk;Kim, GuemBo;Kwon, Yool;Kim, Howon
    • Review of KIISC
    • /
    • v.32 no.2
    • /
    • pp.17-28
    • /
    • 2022
  • 사물인터넷은 물류, 환경, 스마트 홈, 자율주행 자동차, 에너지 관리, 스마트시티, 농업 등 다양한 응용 분야를 가지며, 거의 모든 산업분야의 기본 인프라 사용되는 핵심 기술이다. 하지만, 사물인터넷은 쉬운 공격 노출과 다양한 보안 취약성, 다양한 센서로부터 수집되는 데이터에 대한 개인정보보호의 어려움 등 많은 문제점이 존재한다. 최근, 이러한 사물인터넷의 문제점들을 보완할 수 있는 기술로 블록체인 기술이 주목받고 있다. 사물인터넷과 블록체인을 접목하면, 블록체인의 높은 확장성과 공격에 대한 복원력, 신뢰성, 추적성 등을 통해 사물인터넷 서비스의 보안성, 신뢰성을 향상시킬 수 있다. 또한, 데이터 및 프로세스의 정형화, O&M 효율성 향상 등 다양한 장점을 가질 수 있으며, 블록체인이 접목된 사물인터넷 기술은 대부분의 산업분야에 혁신을 발생시킬 수 있다. 하지만, 사물인터넷 디바이스는 기본적으로 높은 자원 제약성을 가지고 데이터 처리에 높은 TPS 성능을 요구하기 때문에 기존 블록체인 기술과 통합되는 것이 쉽지 않다. 이에, 본 고에서는 사물인터넷과 블록체인의 융합을 위한 요구사항을 분석하고, 사물인터넷과 블록체인의 융합을 위해 필수적으로 요구되는 블록체인 스케일링 기술에 대해 알아본다.

Development of Intelligent Gateway for IoT office service in small size (IoT 오피스 서비스를 위한 소용량 지능형 게이트웨이 개발)

  • Yoo, Seung-Sun;Kim, Sam-Taek
    • Journal of the Korea Convergence Society
    • /
    • v.8 no.11
    • /
    • pp.37-42
    • /
    • 2017
  • Over the next decade, there are estimated to be 250 billion IoT devices in the future, and a variety of new services and device markets are expected to be created via a new network connection. However, it is difficult to accommodate various sensors and IoT devices, such as product and installation environments, for existing IP/SIP/IMS cameras and video door phone. Additionally, recently, sensors and actuators that can accommodate IoT technology and standards are continually updated. In addition, this paper has developed an SIP/IMS intelligent gateway to flexibly accommodate IoT related equipments and to interface with ZigBee/Z-Wave/NFC endpoints in addition to the gateway basic functions. This intelligent gateway will contribute to the development of the IMS system to replace the VoIP system with the IMS equipment due to the growth of the IMS market.

A Study on the A·R type Monitoring Technique using QR-code and Environment Monitoring Sensor Based on Smart Device (QR코드와 환경감시센서를 활용한 스마트 디바이스기반 증강현실형 환경모니터링 기술 연구)

  • Kim, Chan;Shin, Jaekwon;Cha, Jaesang
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.12 no.5
    • /
    • pp.261-265
    • /
    • 2012
  • The applications of augmented reality technology is increasing in the several field by IT convergence and we find augmented reality application easily in the smart device application area. And then, to attempt to use augmented reality technology in advantage, exhibitions and performances was activated. However, it less than other fields of augmented reality technology expertise yet. Among them services to Use in fusion with monitoring are lacking. In this paper, we proposed the augmented reality monitoring technology based on smart device. It is able to incorporate QR-code which is already building for the purpose of advertising promotional materials with augmented reality technology in many areas. Therefore, it is able to utilize unattended building or automation equipment facilities using QR-code and environmental monitoring sensor in the industry.

A Study on gateway authentication protocol in IoT (IoT에서 게이트웨이에 대한 인증 프로토콜에 관한 연구)

  • Lee, Jae-Young
    • Journal of Convergence for Information Technology
    • /
    • v.7 no.3
    • /
    • pp.91-96
    • /
    • 2017
  • IoT which is an abbreviation of Internet of Things refers to the communication network service among various objects such as people-people, objects-objects interconnection. The characteristic of IoT that enables direct connection among each device makes security to be considered as more emphasized factor. Though a security module such as an authentication protocol for resolving various security problems that may occur in the IoT environment has been developed, some weak points in security are still being revealed. Therefore, this paper proposes a method for including a protocol including gateway authentication procedure and mutual authentication between the devices and gateways. Protocols with additional authentication procedures can appropriately respond to attackers' spoofing attacks. In addition, important information in the message used for authentication process is protected by encryption or hash function so that it can respond to wiretapping attacks.