• Title/Summary/Keyword: 보안인식

Search Result 1,361, Processing Time 0.032 seconds

Design and Evaluation of a Rough Set Based Anomaly Detection Scheme Considering Weighted Feature Values (가중 특징 값을 고려한 러프 집합 기반 비정상 행위 탐지방법의 설계 및 평가)

  • Bae, Ihn-Han;Lee, Hwa-Ju;Lee, Kyung-Sook
    • Journal of Korea Multimedia Society
    • /
    • v.9 no.8
    • /
    • pp.1030-1036
    • /
    • 2006
  • The rapid proliferation of wireless networks and mobile computing applications has changed the landscape of network security. Anomaly detection is a pattern recognition task whose goal is to report the occurrence of abnormal or unknown behavior in a given system being monitored. This paper presents an efficient rough set based anomaly detection method that can effectively identify a group of especially harmful internal masqueraders in cellular mobile networks. Our scheme uses the trace data of wireless application layer by a user as feature value. Based on the feature values, the use pattern of a mobile's user can be captured by rough sets, and the abnormal behavior of the mobile can be also detected effectively by applying a roughness membership function considering weighted feature values. The performance of our scheme is evaluated by a simulation. Simulation results demonstrate that the anomalies are well detected by the method that assigns different weighted values to feature attributes depending on importance.

  • PDF

A New Dynamic-ID based RFID Mutual Authentication Protocol Eliminated Synchronization Problem (동기화 문제를 해결한 새로운 동적 아이디기반 RFID 상호 인증 프로토콜)

  • Lim, Ji-Hwan;Oh, Hee-Kuck;Kim, Sang-Jin
    • The KIPS Transactions:PartC
    • /
    • v.15C no.6
    • /
    • pp.469-480
    • /
    • 2008
  • The recently proposed RFID(Radio Frequency Identification) authentication protocol based on a hash function can be divided into two types according to the type of information used for authentication between a reader and a tag: either a value fixed or one updated dynamically in a tag memory. In this paper, we classify the protocols into a static ID-based and a dynamic-ID based protocol and then analyze their respective strengths and weaknesses. Also, we define a new security model including forward/backward traceability, synchronization, forgery attacks. Based on the model, we analyze the previous protocols and propose a new dynamic-ID based RFID mutual authentication protocol. Our protocol provide enhanced RFID user privacy compared to previous protocols and identify a tag efficiently in terms of the operation quantity of a tag and database.

Biometrics Based on Multi-View Features of Teeth Using Principal Component Analysis (주성분분석을 이용한 치아의 다면 특징 기반 생체식별)

  • Chang, Chan-Wuk;Kim, Myung-Su;Shin, Young-Suk
    • Korean Journal of Cognitive Science
    • /
    • v.18 no.4
    • /
    • pp.445-455
    • /
    • 2007
  • We present a new biometric identification system based on multi-view features of teeth using principal components analysis(PCA). The multi-view features of teeth consist of the frontal view, the left side view and the right side view. In this paper, we try to stan the foundations of a dental biometrics for secure access in real life environment. We took the pictures of the three views teeth in the experimental environment designed specially and 42 principal components as the features for individual identification were developed. The classification for individual identification based on the nearest neighbor(NN) algorithm is created with the distance between the multi-view teeth and the multi-view teeth rotated. The identification performance after rotating two degree of test data is 95.2% on the left side view teeth and 91.3% on the right side view teeth as the average values.

  • PDF

The data transmission of the of u-lD sensor networks configuration with a Bluetooth (Bluetooth를 이용한 u-lD센서네트워크 구성에서의 데이터 전송)

  • Kim Young-kil;Park Ji-hoon
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.9 no.2
    • /
    • pp.242-246
    • /
    • 2005
  • RFID(Radio Frequency Identification) which is emerging from a change in digital convergence paradigm and recently rapidly advancing throughout the overall society is the core technology based on Ubiquitous network. In other words, This is a technology to identify the information of the object and recognize the situation by attaching electrical tag to an object and using Reader that can read the information of the object. With the emergence of the technology, it has turned the existing maintenance of the product into the network and intelligence of the product control by using the bar cord to maintain the product and will lead a revolution throughout overall society by affecting the fields of distribution and product maintenance as well as those of medicines, chemicals and food which the electrical tag can be attached to. his paper shows that utilizing the Bluetooth which is a local wireless telecommunication in the standalone imbedded system can implement the piconet configuration among the Readers and the data telecommunication with the main server.

An Implementation of Smart Card Identification System Using 1 vs. 1 Fingerprint Matching (1대1 지문매칭을 이용한 스마트 카드 인증 시스템의 구현)

  • 최순우;김영길
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.5 no.7
    • /
    • pp.1204-1209
    • /
    • 2001
  • According to the rapid development of information and communication, various services are offered using information and communication infrastructure for example e-commerce, internet banking, stock dealings, etc. This time, the most important problem is personal identification. But now secret number that is used to personal identification mostly can be misappropriated. To solve this problem, this paper proposes smart card identification system using 1 vs. 1 fingerprint matching. Information protection and security of smart card excel and use is convenient. And fingerprint becomes the focus of public attention in biometric field. Implemented system in this paper is based on PC. This system stores minutia that is fingerprint information into smart card and compare it with personal minutia. Therefore this system is sure to be on personal identification. If this system is applied to various services, safety degree of services will be enhanced.

  • PDF

A Review of Human Element Issues of Remote Operators on Maritime Autonomous Surface Ships (자율운항선박의 개발 및 운용을 위한 육상 운항사의 인적요인 이슈 고찰)

  • Kim, Hong-Tae;Yang, Young-Hoon
    • Journal of Navigation and Port Research
    • /
    • v.43 no.6
    • /
    • pp.395-402
    • /
    • 2019
  • The development and operation of the MASS (Maritime Autonomous Surface Ship) is being actively discussed for more efficient and safer maritime transportation solutions. The autonomous navigation technology has positive aspects such as the prevention of marine accidents, improvement of fuel efficiency of ships and cost reduction, and negative aspects such as job loss, task change, and security problems. It is expected that there will be new human element issues such as the situation awareness of remote operators, because the shore-based control will be conducted when fully autonomous ships are in operation. In this paper, we consider major human element issues that should be factored in the development and operation of MASS, and suggest a method of HRA (Human Reliability Analysis) for P IFs (Performance Influencing Factors) of the remote operators that are expected according to the shore-based control.

System based on Java Card Using XML Digital Signature on Wireless Internet (무선 환경에서 XML 전자서명을 이용한 Java Card 기반 시스템)

  • Jang Chang-Bok;Choi Eui-In
    • The KIPS Transactions:PartC
    • /
    • v.12C no.1 s.97
    • /
    • pp.37-44
    • /
    • 2005
  • As wireless network was developed and Capability of Wireless Phone was increased, M-Commerce was activates In Wireless network environment. User Authentication and Security in E-Commerce Environment is very important, so Authentication Technology, such as WPKI and Hermes System, XML Digital Signature in Wire Network is studying. But if authentication systems was implemented heterogeneous, WPKI is difficult to implement the system, it's not interoperate with authentication system on wire internet, not support XML digital Signature. Hermes system also not interoperate with XML digital signature system. So our paper designed System that can interoperate among digital signature systems and XML document to apply XML digital signature technology on wire network to wireless network, and then implemented system that can XML digital signature to use Java Card.

Design and Implementation of RTLS using Active RFID (능동형 RFID를 이용한 RTLS의 설계 및 구현)

  • Jung, Dong-Ho;Kim, Jung-Hyo;Ji, Dong-Hwan;Baek, Yun-Ju
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.31 no.12A
    • /
    • pp.1238-1245
    • /
    • 2006
  • Interest to the RTLS that is one of RFID applications is increasing in recent. The RTLS(Real Time Locating Systems) is one of applications for locating and tracking using RFID tags which are attached to something like container, pallet, or all the things. This paper presents the design and the implementation of an RTLS system using 433MHz active RFID tags and use radio frequency to provide the scalability. Our system we developed using RFID platform takes into account an RTLS standard. Also, in this paper a routing protocol is included to data delivery to server via each reader. In order to perform the evaluation, in addition, some experiments in out door are performed and results such as error metric and distance are also included. Furthermore, simulation for the routing protocol we supposed is also included.

A Management Method for Personal Purchases in Mobile RFID System (개인 물품 관리 지원 모바일 RFID 시스템)

  • Kim, Tae-Sung;Sohn, Kyung-Ho;Yoon, Kang-Jin;Kim, Young-Yong
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.35 no.2B
    • /
    • pp.296-301
    • /
    • 2010
  • Radio frequency identification(RFID) system can identify an object using wireless transmission. RFID applications are numerous and far reaching. The most interesting and widely used applications are supply chain management for companies. Currently, RFID tags must be detached or killed for security and privacy reasons when tagged objects are purchased. In this paper, we present a new architecture that transfers information about products from the electronic product code information services (EPCIS) server of a company to an individual's personal purchases management (PPM) server when products with RFID codes are sold. It solves the security and privacy issues without detaching the tag. Moreover, the PPM server described in this paper allows customers to handle the expiration dates, updates, location management, and group management of products.

Utilization Outlook of Medical Big Data in the Cloud Environment (클라우드 환경에서 의료 빅데이터 활용 및 전망)

  • Han, Jung-Soo
    • Journal of Digital Convergence
    • /
    • v.12 no.6
    • /
    • pp.341-347
    • /
    • 2014
  • Among methods of the big data process, big data process under the cloud environment is becoming a main topic. As part of solving faced problem and strengthening industrial competitiveness in the medical and health industry, discussion on ways to activate big data is actively being conducted. Because the reason is a paradigm shift, saving pressure for increasing health care costs, and increased consumer interest for the level of service. In this paper, we find out the relationship between the cloud and big data. And we are to research and analysis a cloud-based big data case in the medical field. Finally we propose the efficient utilization and future outlook. For the smooth functioning of cloud-based medical big data, we have to solve the problems like infrastructure extension, analysis/application software development, and professional manpower training. In addition, we have to correct insufficient laws maintenance to the Cloud utilization, and improve the security and the recognition to personal information, and solve authority for data centralization.