• Title/Summary/Keyword: 배치인증

Search Result 57, Processing Time 0.032 seconds

An Analysis on the Characteristics of Barrier Free Certifications in Elementary School (초등학교시설 장애물 없는 생활환경 인증 실태분석 연구)

  • Lee, Jeong-Soo;Oh, Young-Sook;Eun, Dong-Shin
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.20 no.7
    • /
    • pp.26-35
    • /
    • 2019
  • The purpose s of this study is to verify the status of barrier-free certification in an elementary school. To achieve this, the architectural characteristics of an elementary school and proposed opinions about the process of barrier-free certification were analyzed. The results of this study are as follows: (1) barrier-free certification in an elementary school is valid for inclusive education and accessibility for students with disabilities. (2) Regarding the school district and safe accessibility for the school, it is necessary to minimize the differences in land levels around the school. (3) Considering the opinions on intermediate facilities from the road to the main entrance, it is necessary to set the finish level of the first floor and to minimize the establishment of ramp or steps to prevent the backflow of rainfall.

A Study on Smart Suthentication Process for Non-face-to-face Body heat Detector with Smart Authentication (비대면 스마트 인증 발열 감지기를 위한 스마트 인증 프로세스 연구)

  • Kim, Hyung-O;Hong, ChangHo;Lee, Hyo Jae;Kim, Eung-seok
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2021.05a
    • /
    • pp.244-245
    • /
    • 2021
  • Recently, A fever test is essential in a crowded places over the world because of COVID-19. A fever test is also conducted for visitors through a thermometer or a thermal imaging camera In Korea leading world with K-quarantine. However, the current body heat measurement process is divided into the steps of body heat examination and entry register. Therefore, access control person must be deployed at the entrance. In addition, since the accessor directly measures body heat and records personal information, the reliability of the information is low and the risk of personal information leakage is high. Therefore, in this paper, we consider the non-face-to-face smart authentication fever detector and propose a smart authentication process to unify the process for dualized body heat measurement and access recording.

  • PDF

Secret Sharing based Node Authentication in FANET (FANET에서의 비밀분산 기반 노드 인증)

  • Yang Ji Hun;Lee Soo Jin
    • Convergence Security Journal
    • /
    • v.22 no.4
    • /
    • pp.25-34
    • /
    • 2022
  • This paper proposes a secret sharing based fast node authentication technique applicable to Flying Ad-Hoc Network (FANET) that can be used to construct self-organized communication network in multi drones and drone squadrons operations. Before deployment, each node stores an exponential share, exponential secret and a portion of PUF CRP table. After being deployed in the field, in the early-stage of network formation, each node broadcasts its ID, exponential share and a hash value of PUF Response and pseudo-random number. Then each node performs a reconstruction of the exponential secret using the exponential shares transmitted from neighboring nodes. When the exponential secret is reconstructed, simultaneous authentication is completed for all nodes that have transmitted the exponential share used in the reconstruction. A node that transmits an incorrect exponential share to disturb the reconstruction of the exponential secret during the authentication process can be detected before performing the reconstruction through the verification of the hash value, and will be excluded from the reconstruction.

Design Review of Combustion Chamber/Turbo-pump Test Facility of Liquid Rocket Engine for KSLV-II (한국형발사체 액체엔진 연소기 및 터보펌프 시험설비 배치 및 설계에 대한 검토)

  • Han, Yeoung-Min;Cho, Nam-Kyung;Chung, Young-Gahp;Kim, Seung-Han;Yu, Byung-Il;Lee, Kwang-Jin;Kim, Jin-Sun;Kim, Ji-Hoon
    • Proceedings of the Korean Society of Propulsion Engineers Conference
    • /
    • 2011.04a
    • /
    • pp.109-112
    • /
    • 2011
  • The result of design review and arrangement of a combustion chamber test facility(CTF) and a turbo-pump real propellant test facility(TPTF) is briefly described. The development/qualification tests of combustion chamber and turbo-pump for 75ton-class liquid rocket engine will be performed in CTF and TPTF. The critical design of hydraulic-pneumatic system, control and data acquisition system, test stand cell, and auxiliary facilities in CTF and TPTF was performed.

  • PDF

Device Security Bootstrapping Mechanism on the IEEE 802.15.4-Based LoWPAN (IEEE 802.15.4 기반 LoWPAN에서의 디바이스 보안 설정 메커니즘)

  • Lee, Jong-Hoon;Park, Chang-seop
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.26 no.6
    • /
    • pp.1561-1569
    • /
    • 2016
  • As the use of the sensor device increases in IoT environment, the need for device security is becoming more and more important When a sensor device is deployed in IEEE 802.15.4-based LoWPAN, it has to perform the join operation with PAN Coordinator and the binding operation with another device. In the join and binding process, authentication and key distribution of the device are performed using the pre-distributed network key or certificate. However, the network key used in the conventional method has problems that it's role is limited to the group authentication and individual identification is not applied in certificate issuing. In this paper, we propose a secure join and binding protocol in LoWPAN environment that solves the problems of pre-distributed network key.

A Cluster-Header Selecting Method for more Secure and Energy-Efficient in Wireless Sensor Network (무선 센서 네트워크에서 안전하고 에너지 효율적인 클러스터 헤더 선출 기법)

  • Kim, Jin-Mook;Lee, Pung-Ho;Ryou, Hwang-Bin
    • Convergence Security Journal
    • /
    • v.7 no.2
    • /
    • pp.107-118
    • /
    • 2007
  • Distributed wireless sensor network in various environment have characteristic that is surveillance of environment-element and offering usefully military information but there is shortcoming that have some secure risks. Therefore secure service must be required for this sensor network safety. More safe and effective techniques of node administration are required for safe communication between each node. This paper proposes effective cluster-header and clustering techniques in suitable administration techniques of group-key on sensor network. In this paper, first each node transmit residual electric power and authentication message to BS (Base-Station). BS reflects "Validity Authentication Rate" and residual electric power. And it selects node that is more than these regularity values by cluster header. After BS broadcasts information about cluster header in safety and it transmits making a list of information about cluster member node to cluster header. Also, Every rounds it reflects and accumulates "Validity Authentication Rate" of former round. Finally, BS can select more secure cluster header.

  • PDF

Research on the Relative Importance and the Priority for the Functions of the U-City Service Aid Organization (U-City 서비스 지원기관 기능의 상대적 중요도와 우선순위 연구)

  • Yi, Mi Sook;Shin, Dong Bin;Lee, Jae Yong
    • Spatial Information Research
    • /
    • v.21 no.2
    • /
    • pp.35-43
    • /
    • 2013
  • The aim of this research is to analyze the priority to functions of the U-city Service Aid Organization(USAO), which is to support invigorating U-City industry. This research analyzes the relative importance and the priority about the functional area and components of UASO based on AHP. This research also performs a sensitivity analysis. The research result shows that relative importance of functional area is like following orders: 1) distribution of U-City service-related information, 2) quality certification of U-City-related products and services, 3) R&D of U-City technology, 4) standardization of U-City, 5) U-City human resource development. The relative importance order of functional components is 1) establishment of U-City information distribution organization, 2) construction and management of U-City information distribution network, 3) supporting U-City information distribution and price policy, 4) providing U-City information list for distribution, 5) preparation and application of quality certification standard of U-City products and services, 6) research on legal system of U-City items, targets, and procedures for quality certification, 7) research, analysis, and provision of U-City information distribution situation, 8) level examination of constructed infrastructures and services in U-City, 9) U-City core technology development and localization of technology, 10) standardization of collected U-City information, service classification, distribution system. This research result can be applied directly to design functions of USAO. The result also can be used for duty management, human resource planning, or resource allocation.

ANASP System for Effective Active Network Security (효과적인 액티브 네트워크에서의 보안서비스를 위한 ANASP시스템)

  • Han, In-sung;Kim, Jin-muk;Ryou, Hwang-Bin
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2004.05a
    • /
    • pp.1051-1054
    • /
    • 2004
  • 액티브 네트워크란 네트워크에 프로그램 가능한 라우터나 스위치를 배치하여, 전송되는 패킷들을 서비스 특성이나 사용자 요구에 따라 적합하게 연산, 처리작업을 수행하고 수정할 수 있는 네트워크를 말한다. 그러나 이러한 액티브 네트워크의 단점은 기존의 패시브 네트워크가 패킷 포워딩 기능만을 제공하는 것에 비해 더욱 복잡한 네트워크 상태로 인해 보다 많은 보안상의 위협과 공격이 훨씬 쉽고 다양하다. 이에 따라 보안 및 안전의 문제가 중요한 관심사가 되었다. 본 논문에서는 악의적인 목적으로 액티브 노드의 취약성을 이용하여 어플리케이션 코드를 액티브 노드에 설치하게 되어 전체적인 네트워크를 위협할 수 있는 액티브 네트워크의 단점을 보완하고자, 설치하려는 어플리케이션 코드에 대한 인증 및 무결성과 접근권한 기법을 이용한 어플리케이션 코드의 관리와 전송제어를 하는 ANASP시스템을 설계 및 구현하고자 한다.

  • PDF

Determination Method of Security Threshold using Fuzzy Logic for Statistical Filtering based Sensor Networks (통계적 여과 기법기반의 센서 네트워크를 위한 퍼지로직을 사용한 보안 경계 값 결정 기법)

  • Kim, Sang-Ryul;Cho, Tae-Ho
    • Journal of the Korea Society for Simulation
    • /
    • v.16 no.2
    • /
    • pp.27-35
    • /
    • 2007
  • When sensor networks are deployed in open environments, all the sensor nodes are vulnerable to physical threat. An attacker can physically capture a sensor node and obtain the security information including the keys used for data authentication. An attacker can easily inject false reports into the sensor network through the compromised node. False report can lead to not only false alarms but also the depletion of limited energy resource in battery powered sensor networks. To overcome this threat, Fan Ye et al. proposed that statistical on-route filtering scheme(SEF) can do verify the false report during the forwarding process. In this scheme, the choice of a security threshold value is important since it trades off detection power and energy, where security threshold value is the number of message authentication code for verification of false report. In this paper, we propose a fuzzy rule-based system for security threshold determination that can conserve energy, while it provides sufficient detection power in the SEF based sensor networks. The fuzzy logic determines a security threshold by considering the probability of a node having non-compromised keys, the number of compromised partitions, and the remaining energy of nodes. The fuzzy based threshold value can conserve energy, while it provides sufficient detection power.

  • PDF

A Comparative Analysis Teachers' Certification and Recruitment Examination System in the Korea and U.S. (한국과 미국의 사서교사 임용 및 자격시험 비교.분석에 관한 연구)

  • Lee, Byeong-Ki
    • Journal of Korean Library and Information Science Society
    • /
    • v.42 no.2
    • /
    • pp.127-149
    • /
    • 2011
  • The presence of teacher is very important and it could be the core of making success or failure of education. Thus, most countries have a training program and employment system school teachers for guarantees to school teachers' qualification and profession. Teacher qualifications can be obtained by law, teacher recruitment examination for school in Korea. The Praxis tests are taken by individuals entering the teaching profession as part of the certification process required by many states and professional licensing organizations in U.S. Korea teacher employment test consist of 3 groups(1st, 2nd, 3rd test), 1st test measure general and subject-specific Knowledge. The U.S. teacher certification test consist of 3 groups(Praxis I, II, III), Praxis II measure knowledge of specific subjects that K-12 educators will teach, as well as general and subject-specific teaching skills and knowledge. The purposes of this study is to review teachers' certification and recruitment system comparative analysis examination questions in the Korea and U.S. This will allow for suggestions in the Korean teacher librarian employment test system.