• Title/Summary/Keyword: 비밀유지

Search Result 135, Processing Time 0.026 seconds

A New Pairwise Key Pre-Distribution Scheme for Wireless Sensor Networks (무선 센서 네트워크를 위한 새로운 키 사전 분배 구조)

  • Kim, Tae-Yeon
    • The KIPS Transactions:PartC
    • /
    • v.16C no.2
    • /
    • pp.183-188
    • /
    • 2009
  • Wireless sensor networks will be broadly deployed in the real world and widely utilized for various applications. A prerequisite for secure communication among the sensor nodes is that the nodes should share a session key to bootstrap their trust relationship. The open problems are how to verify the identity of communicating nodes and how to minimize any information about the keys disclosed to the other side during key agreement. At any rate, any one of the existing schemes cannot perfectly solve these problems due to some drawbacks. Accordingly, we propose a new pre-distribution scheme with the following merits. First, it supports authentication services. Second, each node can only find some indices of key spaces that are shared with the other side, without revealing unshared key information. Lastly, it substantially improves resilience of network against node capture. Performance and security analyses have proven that our scheme is suitable for sensor networks in terms of performance and security aspects.

Proposal of Safe PIN Input Method on VR (VR 상에서의 안전한 PIN 입력 방법 제안)

  • Kim, Hyun-jun;Kwon, Hyeok-dong;Kwon, Yong-bin;Seo, Hwa-jeong
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.23 no.5
    • /
    • pp.622-629
    • /
    • 2019
  • VR(Virtual Reality), which provides realistic services in virtual reality, provides a similar experience using a Head Mounted Display(HMD) device. When the HMD device is worn, it can not recognize the surrounding environment and it is easy to analyze the input pattern of the user with the Shoulder Surfing Attack(SSA) when entering the Personal Identification Number(PIN). In this paper, we propose a method to safeguard the user's password even if the hacker analyzes the input pattern while maintaining the user's convenience. For the first time, we implemented a new type of virtual keypad that deviates from the existing rectangle shape according to the VR characteristics and implemented the lock object for intuitive interaction with the user. In addition, a smart glove using the same sensor as the existing input devices of the VR and a PIN input method suitable for the rotary type are implemented and the safety of the SSA is verified through experiments.

Delivery Tracing Protect Model Based Smart Contract for Guaranteed Anonymity (익명성 보호를 위한 스마트 컨트랙트의 배송추적 방지 모델)

  • Kim, Young Chan;Kim, Young Soo;Im, Kwang Hyuk
    • Journal of Industrial Convergence
    • /
    • v.16 no.1
    • /
    • pp.15-20
    • /
    • 2018
  • Along with the increase of internet shopping, crimes that exploited personal information on the invoice of goods are becoming more and more advanced and becoming more and more classified from the interception of goods through voice phishing attack, injury, sexual offense. Therefore, in order to guarantee the anonymity of the customer's delivery information, there is a need for a delivery tracking prevention system which keeps the route information of the product's destination secret among delivery companies. For this purpose, We suggest that delivery tracing protect model based smart contract for guaranteed anonymity to protect the anonymity by encrypting delivery information and by separation of payment and personal information using the anonymity technique of block chain-based cryptography. Our proposed model contributes to expansion of internet shopping based on block chaining by providing information about product sales to company and guaranteeing anonymity of customer's delivery information to customer.

A Study on Smart Door Lock using Internet of Things (IoT를 이용한 스마트 도어락에 관한 연구)

  • Kim, Jang-Won
    • The Journal of Korea Institute of Information, Electronics, and Communication Technology
    • /
    • v.13 no.6
    • /
    • pp.539-544
    • /
    • 2020
  • The research is on progressing to operate digital door lock with the method to guarantee the security and safety in the meantime to use digital door lock conveniently using Internet of Things (IoT) standardizing various service providing technology using IoT in home network currently. In this study, compose home network interconnecting Raspberry-PI and web server reflection this trend and composed the system to control the door lock after connect Arduino substituting converter function. Making Raspberry-PI using dynamic IP address using existing open source easily maintain DNS information and possible to connect internet network in home network ethernet and finally, making the smartphone can control door lock remotely entering designated address after connect the internet. The connection between home network and Arduino is executed by Raspberry-PI and bluetooth pairing as 1:1 and make random user's access to be impossible. Especially, to make open/close the door lock with smartphone not by using password on the keypad or using RFID card is judged as the method increasing the security make random user's access to be impossible and also increased the usefulness making remote control to be possible.

A Study on Privacy Violation Vulnerability Through E-Mail Sent to Expired Domains (만료된 도메인의 전자우편을 통한 개인정보 유출에 관한 연구)

  • Kim, DongHyun;Hong, YunSeok
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2022.10a
    • /
    • pp.146-149
    • /
    • 2022
  • With internet development, many peoples use their email to exchange documents, register for web services, and much more. Some individuals/organizations (including educational institutions) use their own domain name for email instead of a domain provided by commercial email services. However, suppose the domain used for custom email expires. In that case, other individuals/organizations can reuse the domain, and the new domain owner can send and receive all emails incoming to the domain. It makes us concerned about Privacy violations. Email that new domain owners can look into also contains sensitive emails like password reset notifications, credit card statements, order history, and more. In this research, we would like to describe the privacy violations caused by the expired domain used for email that did not remove all dependencies of email users and propose a solution.

  • PDF

Considerations for Implementing Online Art-Based Peer Supervision (온라인 미술기반 동료 슈퍼비전 실행에 대한 고려사항)

  • Yoon, Ra-Mi;Kim, Soo-In;Jung, HeeJae
    • The Journal of the Korea Contents Association
    • /
    • v.22 no.5
    • /
    • pp.404-415
    • /
    • 2022
  • The purpose of this study is to propose considerations to help actual application based on the characteristics of the online art-based peer supervision execution process. Colleagues in the clinical art therapy doctoral program, including the researcher, attempted to repeatedly identify problems and apply improvements in the implementation process as research participants, and qualitatively analyzed the various data collected in the process. Looking at the characteristics of the analysis results, extensibility of materials and space was confirmed in terms of 'art-based' and initiative, convenience, and speed in terms of 'online'. The considerations identified through this are as follows. First, 'pre-structuring' should be based on clear boundaries and setting, prior consultation of the group, and self-directed preparation and attitude. Second, for the 'structural aspect of art', space and media to help immersion through creation, and stable implementation structure should be established. Third, in the 'technical aspect', it is necessary to apply a method that can deliver a work of art and a method that can communicate the creator's clear intention. Lastly, for the 'ethical aspect', it is necessary to use online software in accordance with the minimum security standards and to make efforts to repeatedly maintain confidentiality. This study is meaningful in that it suggested a practical method for maintaining the professional competence of art therapists and expanding networks among art therapists in various situations including pandemics.

A Study on the Institutional Improvement Directions of Industrial Security Programs: Focused upon Policies and Practices in the U.S. (산업보안의 제도적 발전방안 연구: 미국 사례를 중심으로)

  • Choi, Justin Jin-Hyuk
    • Korean Security Journal
    • /
    • no.22
    • /
    • pp.197-230
    • /
    • 2010
  • This study examined the institutional improvement directions of industrial security programs, particularly focusing upon policies and practices in the U.S., to enhance the effectiveness of industrial security programs in Korea. This study also aimed to investigate the significance of institutional and/or policy implementations in preventing economic espionage attempt. Data leakage and/or loss of trade secrets in corporations has been a scary proposition and a serious headache to both the CEOs and the CSOs(Chief Security Officers). Security professionals or practitioners have always had to deal with data leakage issues that arise from e-mail, instant messaging(IM), and other Internet communication channels. In addition, with the proliferation of wireless and mobile technology, it's now much easier than ever for loss by data breaches to occur, whether accidentally or maliciously or even by an economic espionage attempt. The researcher in this study used both a case study and a comparative research to analyze the different strategies and approaches between the U.S. and Korea in regard of implementing policies to mitigate damages by economic espionage attempts and prevent them from occurring. The researcher first examined the current policies and practices in the U.S. in terms of federal government's and agencies' approach and strategies on industrial security programs and their partnerships with private-commercial-sectors. The purpose of this paper is to explain and suggest selected findings, and a discussion of actions to be taken on implementing a proactive and tactical approach to enhance the effectiveness of industrial security programs to fight against information loss or data leaks. This study used case reviews, literatures, newspapers, articles, and Internet resources relating to the subject of this study for triangulation of data. The findings during this research are as follows. This research suggests that both the private and the governmental sector should closely cooperate in the filed of industrial security to strengthen its traditional prevention strategies and reduce opportunities of economic espionage as well. This study finally recognizes both the very importance of institutional development led by the Government in preventing economic espionage attempts and its effectiveness when properly united with effective industrial security programs.

  • PDF

Selectively Partial Encryption of Images in Wavelet Domain (웨이블릿 영역에서의 선택적 부분 영상 암호화)

  • ;Dujit Dey
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.28 no.6C
    • /
    • pp.648-658
    • /
    • 2003
  • As the usage of image/video contents increase, a security problem for the payed image data or the ones requiring confidentiality is raised. This paper proposed an image encryption methodology to hide the image information. The target data of it is the result from quantization in wavelet domain. This method encrypts only part of the image data rather than the whole data of the original image, in which three types of data selection methodologies were involved. First, by using the fact that the wavelet transform decomposes the original image into frequency sub-bands, only some of the frequency sub-bands were included in encryption to make the resulting image unrecognizable. In the data to represent each pixel, only MSBs were taken for encryption. Finally, pixels to be encrypted in a specific sub-band were selected randomly by using LFSR(Linear Feedback Shift Register). Part of the key for encryption was used for the seed value of LFSR and in selecting the parallel output bits of the LFSR for random selection so that the strength of encryption algorithm increased. The experiments have been performed with the proposed methods implemented in software for about 500 images, from which the result showed that only about 1/1000 amount of data to the original image can obtain the encryption effect not to recognize the original image. Consequently, we are sure that the proposed are efficient image encryption methods to acquire the high encryption effect with small amount of encryption. Also, in this paper, several encryption scheme according to the selection of the sub-bands and the number of bits from LFSR outputs for pixel selection have been proposed, and it has been shown that there exits a relation of trade-off between the execution time and the effect of the encryption. It means that the proposed methods can be selectively used according to the application areas. Also, because the proposed methods are performed in the application layer, they are expected to be a good solution for the end-to-end security problem, which is appearing as one of the important problems in the networks with both wired and wireless sections.

불공정거래행위 규제에 대한 발전적 입법론에 대하여

  • An, Byeong-Han
    • Journal of Korea Fair Competition Federation
    • /
    • no.150
    • /
    • pp.14-29
    • /
    • 2010
  • 비록 부정경쟁방지법의 제정 목적이 부정경쟁행위 등의 방지를 통하여 건전한 거래질서를 유지한다는 의미의 경쟁체제 확립에 있기는 하지만, 우리나라의 경우는 법 제정 당시와는 달리 사실상 산업스파이에 대한 영업비밀의 보호나 주지의 상표 영업표지의 보호와 같은 지적재산권의 보호 법률로서의 역할로 점차 변화하고 있고, 특히 부정경쟁방지법이 주지의 상표에 대한 출처의 혼동에 대한 규제뿐만이 아니라 별도로 저명상표의 희석화(稀釋化) 방지라는 법익, 이에 더 나아가 도메인 네임(Domain Name)의 선점과 원산지 및 품질의 오인(誤認) 야기행위, 주지 저명한 타인의 디자인(Design), 캐릭터(Character)와 같은 상품의 표지에 이르기까지 지적재산권과 관련된 보다 넓은 법익의 보호까지 수행하게 되면서 그 기능은 날로 강화되고 있는 상태이다. 이에 반하여 부정경쟁방지법상의 부정경쟁행위 자체에 대한 규제는 사실상 주지 저명한 타인의 상표나 상품표지의 식별력이나 출처표시기능 등의 보호라는 의미의 분쟁수준을 넘지 못하고 있어, '경쟁법'으로서의 역할은 상대적으로 미약해지고 있는 것 또한 현실이다. 또한, 공정거래법 제23조 제1항 제8호를 비롯하여 현행 공정거래법상의 불공정거래행위에 대한 규정체제를 살펴보면, 해석 여하에 따라서는 부정경쟁방지법상의 부정경쟁행위가 대부분 공정거래법상의 불공정거래행위의 범위 내로 포섭될 수도 있는 상황이기도 하다. 이에 양 법률의 성격과 역할, 앞으로 나아가야 할 방향을 고민하지 않을 수 없고, 이와 같은 논의는 발전적 입법론으로서의 가치를 갖는다. 물론 불공정거래행위(부정경쟁행위)에 대한 규제에 있어서 반드시 독일법체계에 따를 것인지 아니면 미국의 경우를 따를 것인지에 대한 선택 자체가 논리적으로 양립 불가능한 것은 아닐 것이지만 우리나라의 경우는 1980년 "독점규제 및 공정거래에 관한 법률"이 제정되는 과정에서 당시 부정경쟁방지법에 담겨 있던 기존의 부정경쟁행위에 대한 규정과 공정거래법상의 불공정거래행위와의 경합이나 중복문제는 마땅히 검토되었어야 했음에도 불구하고 공정 거래법의 제정과정에서 사실상 부정경쟁방지법의 존재 자체가 간과되어 오늘에 이르고 있다. 그동안 양 법률상의 규정 중복이나 충돌을 정식으로 문제 삼았던 바는 없었지만 '발전적 입법론' 이라는 차원에서 살펴 보면 부정경쟁방지법상의 부정경쟁행위에 대한 규제는 앞으로 공정거래법체계 내의 불공정거래행위로 포섭할 필요가 있고 이를 통하여 경쟁정책의 전문 전담기구로서 불공정거래행위에 대한 규제의 중심에 서 있는 공정거래위원회를 중심으로 효율적이고 통일적인 경쟁정책을 확립을 기대하여 볼 수 있을 것이다. 이 과정에서 공정거래법의 변화 또한 뒤따라야 하는데, 부정경쟁방지법상의 부정경쟁행위의 편입에 따라 불공정거래행위에 대한 규정 일부를 알맞게 다시 수정하는 것에 그치지 않고, 기존 부정경쟁방지법이 인정하고 있었던 사인간(私人間) 금지 또는 예방청구권 또한 공정거래법으로 그대로 편입되는 방향으로의 입법 개선이 이루어질 필요가 있으며, 그동안 '부정경쟁방지법의 공정거래법으로의 편입문제'와는 전혀 무관하게 공정거래법의 사적 구제 및 사소(私訴)의 활성화 차원의 논의로서 공정거래법상 사인간 금지청구권의 도입 여부가 검토되어 왔지만, 앞으로 이 문제는 부정경쟁방지법상 부정경쟁행위의 공정거래법체계 내로의 편입문제와 함께 이를 포함한 더욱 큰 논의로서 다시 적극적으로 검토될 필요가 있다고 본다. 이를 통하여 앞으로 부정경쟁방지법은 특허청을 중심으로 산업스파이에 대한 규제나 영업비밀의 보호와 기타 지적재산권의 보호에 온 힘을 다하고, 공정거래법은 공정거래위원회를 중심으로 불공정거래행위 (부정경쟁행위에 대한 보다 포괄적이고 통일적인 규제를 담당하여 '선택과 집중' 이라는 차원의 각 법률체계의 한 차원 높은 발전 또한 기대해 볼 수 있을 것으로 확신한다. 이러한 합의점을 시작으로 미시적인 다음 단계의 논의에 해당하는 사인간 금지청구권의 허용범위나 허용요건, 남용을 방지하기 위한 제도적 장치, 단체소송 등의 허용 여부 등의 논의도 함께 하여야 할 것이고, 이 과정에서 미국의 클레이튼법(Clayton Act)이나 가까운 일본의 입법례를 참고하여 우리의 실정에 맞는 규제의 틀을 마련함이 타당할 것이고, 이를 통하여 궁극적으로 그동안 공정거래법의 사적 집행의 활성화를 통한 경쟁질서의 확립의 강화라는 이상에 더욱 가까워질 수 있는 좋은 입법적 변화의 모습을 볼 수 있을 것이라 생각한다.

  • PDF

A Study on Mother's Experience in Disclosure of Incestuous Sexual Abuse (어머니의 근친성학대 드러냄(disclosure) 경험에 관한 현상학적 연구)

  • Kim, Kyung-Hee
    • Korean Journal of Social Welfare
    • /
    • v.61 no.3
    • /
    • pp.205-228
    • /
    • 2009
  • The incestuous assault tends to remain a family secret and not easily be disclosed. Mothers of the victims are usually regarded as the responsible person holding the key to decide whether it should be disclosed or not. Sometimes, therefore, they are blamed with the charge of connivance. The purpose of this study was to explore the essence of mothers' experience of disclosing and to understand the subjective meaning given to this experience. Seven mothers of the female victims of incestuous assault were recruited and interviewed. The collected data was analyzed by hermeneutic phenomenological method. The essential theme of the mothers' disclosing experiences could be summarized as "overcoming pain by going through pain". This major theme contained three sub-themes: "wanting to vent the deepest tormenting pain", "getting hurt again by disregard and indifference from others", "attempting to tear open the festering wound and to feel recovered". Mothers experienced the disclosing process as revisiting the hidden wound to find the meaning of the incident and to cultivate the necessary skill and power to overcome the pain. Especially, mother's disclosing process was characterized by constant restructuring of past trauma through mother's will and knowledge, acknowledging the unmodifiable past, interpreting other people's responses, and, finally, constantly interacting with sociocultural context. The study result stressed the importance of considering the whole array of difficulties and meanings experienced by mothers in the disclosing process. Social work services should provide more professional and sensitive care when mothers try to disclose the dark secret of incestuous assault.

  • PDF