• Title/Summary/Keyword: 사용자 안전관리

Search Result 738, Processing Time 0.034 seconds

Entity Authentication Scheme for Secure WEB of Things Applications (안전한 WEB of Things 응용을 위한 개체 인증 기술)

  • Park, Jiye;Kang, Namhi
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.38B no.5
    • /
    • pp.394-400
    • /
    • 2013
  • WoT (Web of Things) was proposed to realize intelligent thing to thing communications using WEB standard technology. It is difficult to adapt security protocols suited for existing Internet communications into WoT directly because WoT includes LLN(Low-power, Lossy Network) and resource constrained sensor devices. Recently, IETF standard group propose to use DTLS protocol for supporting security services in WoT environments. However, DTLS protocol is not an efficient solution for supporting end to end security in WoT since it introduces complex handshaking procedures and high communication overheads. We, therefore, divide WoT environment into two areas- one is DTLS enabled area and the other is an area using lightweight security scheme in order to improve them. Then we propose a mutual authentication scheme and a session key distribution scheme for the second area. The proposed system utilizes a smart device as a mobile gateway and WoT proxy. In the proposed authentication scheme, we modify the ISO 9798 standard to reduce both communication overhead and computing time of cryptographic primitives. In addition, our scheme is able to defend against replay attacks, spoofing attacks, select plaintext/ciphertext attacks, and DoS attacks, etc.

Remote Care Using Medical Bed System Equipped With Body Pressure Sensors (체압 센서를 이용한 의료용 침대의 원격 케어)

  • Jaehyeok Jeung;Sanghyun Bok;Junhee Lim;Bokyung Oh;Youngdae Lee
    • The Journal of the Convergence on Culture Technology
    • /
    • v.9 no.1
    • /
    • pp.619-625
    • /
    • 2023
  • In this paper, the remote care of medical beds with multiple body pressure sensors is described. Falling is one of the factors that seriously threaten the safety of patients and harm their health. In this study, a new bed was developed to overcome this. The bed system consists of a keyboard that can operate, a keyboard controller that manages the movement of the keyboard, a sensor that measures body pressure, a sensor controller that transmits and receives sensor values, a main controller that checks it and operates automatically or manually according to the algorithm, and a server that oversees all these information. The bed system checks the patient's location through a sensor and wirelessly alerts the server through the main controller when the patient determines that there is a risk of falling, so that the nurse or nurse can recognize the patient's dangerous condition. The server may receive state data transmitted from the wired/wireless terminal to monitor whether the bed system is operating normally. The controller of the keyboard operates a keyboard-type mechanism and automatically controls the prevention of bedsores connected by body pressure sensors to physically separate the area to which the patient's pressure is applied to prevent bedsores. The main controller checks the presence of the patient's bed and transmits it to the server. In conclusion, the proposed system can smart monitor the user's state and perform remote care.

Design and Forensic Analysis of a Zero Trust Model for Amazon S3 (Amazon S3 제로 트러스트 모델 설계 및 포렌식 분석)

  • Kyeong-Hyun Cho;Jae-Han Cho;Hyeon-Woo Lee;Jiyeon Kim
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.33 no.2
    • /
    • pp.295-303
    • /
    • 2023
  • As the cloud computing market grows, a variety of cloud services are now reliably delivered. Administrative agencies and public institutions of South Korea are transferring all their information systems to cloud systems. It is essential to develop security solutions in advance in order to safely operate cloud services, as protecting cloud services from misuse and malicious access by insiders and outsiders over the Internet is challenging. In this paper, we propose a zero trust model for cloud storage services that store sensitive data. We then verify the effectiveness of the proposed model by operating a cloud storage service. Memory, web, and network forensics are also performed to track access and usage of cloud users depending on the adoption of the zero trust model. As a cloud storage service, we use Amazon S3(Simple Storage Service) and deploy zero trust techniques such as access control lists and key management systems. In order to consider the different types of access to S3, furthermore, we generate service requests inside and outside AWS(Amazon Web Services) and then analyze the results of the zero trust techniques depending on the location of the service request.

Comparison of SureTectTM with phenotypic and genotypic method for the detection of Salmonella spp. and Listeria monocytogenes in ready-to-eat foods (즉석섭취식품에 존재하는 Salmonella spp.와 Listeria monocytogenes의 검출을 위한 SureTectTM와 표현형 및 유전자형 방법의 비교)

  • Kye-Hwan Byun;Byoung Hu Kim;Ah Jin Cho;Eun Her;Sunghee Yoon;Taeik Kim;Sang-Do Ha
    • Food Science and Preservation
    • /
    • v.30 no.2
    • /
    • pp.262-271
    • /
    • 2023
  • The objective of this study is to compare and assess the effectiveness of real-time polymerase chain reaction (RT-PCR), loop-mediated isothermal amplification (LAMP), and the selective agar plate method for the detection of Salmonella spp. and Listeria monocytogenes in ready-to-eat (RTE) foods. In RTE foods, the detection performance of the three methods (RT-PCR [SureTectTM kit and PowerChekTM kit], LAMP [3M MDS], selective agar) were similar at 0-10, 10-50, 50-100, and 100- CFU/mL of Salmonella spp. and L. monocytogenes. We found that with RT-PCR, the Ct value of salad was significantly higher (p<0.05) than other RTE foods, indicating that fiber plays a critical role as an obstacle to the rapid detection of Salmonella spp. However, the Ct value displayed a mixed pattern according to the inoculation level of L. monocytogenes. The use of rapid detection kits and machines mostly depends on the user's choice, with accuracy, ease of use, and economy being the primary considerations. As an RT-PCR kit, SureTectTM and PowerChekTM showed high accuracy in detecting Salmonella spp. and L. monocytogenes in RTE foods, showing that they can replace the existing RT-PCR kits available. Additionally, LAMP also showed excellent detection performance, suggesting that it has the potential to be used as a food safety management tool.

A Study on the RFID's Application Environment and Application Measure for Security (RFID의 보안업무 적용환경과 적용방안에 관한 연구)

  • Chung, Tae-Hwang
    • Korean Security Journal
    • /
    • no.21
    • /
    • pp.155-175
    • /
    • 2009
  • RFID that provide automatic identification by reading a tag attached to material through radio frequency without direct touch has some specification, such as rapid identification, long distance identification and penetration, so it is being used for distribution, transportation and safety by using the frequency of 125KHz, 134KHz, 13.56MHz, 433.92MHz, 900MHz, and 2.45GHz. Also it is one of main part of Ubiquitous that means connecting to net-work any time and any place they want. RFID is expected to be new growth industry worldwide, so Korean government think it as prospective field and promote research project and exhibition business program to linked with industry effectively. RFID could be used for access control of person and vehicle according to section and for personal certify with password. RFID can provide more confident security than magnetic card, so it could be used to prevent forgery of register card, passport and the others. Active RFID could be used for protecting operation service using it's long distance date transmission by application with positioning system. And RFID's identification and tracking function can provide effective visitor management through visitor's register, personal identification, position check and can control visitor's movement in the secure area without their approval. Also RFID can make possible of the efficient management and prevention of loss of carrying equipments and others. RFID could be applied to copying machine to manager and control it's user, copying quantity and It could provide some function such as observation of copy content, access control of user. RFID tag adhered to small storage device prevent carrying out of item using the position tracking function and control carrying-in and carrying-out of material efficiently. magnetic card and smart card have been doing good job in identification and control of person, but RFID can do above functions. RFID is very useful device but we should consider the prevention of privacy during its application.

  • PDF

The Place Where the Cabin or Flight Crew of International Air Carrier Habitually Carries Out his/her Work - CJEU, 2017. 9. 14., C-168/16, C-169/16 - Sandra Nogueira and Others v. Crewlink Ltd Miguel José Moreno Osacar v. Ryanair (국제항공운송 승무원의 일상적 노무제공지)

  • Kwon, Chang-Young;Kim, Sun-Ah
    • The Korean Journal of Air & Space Law and Policy
    • /
    • v.34 no.1
    • /
    • pp.39-77
    • /
    • 2019
  • Crew members engaged in international air transportation provide work in many countries due to the nature of their work. According to the Private International Act, the place where the employee habitually carries out his/her work plays an important role in the determination of the governing law of the international labor contract (Article 28, Paragraph 2) and in the decision of international jurisdiction (Article 28, Paragraphs 3 and 4). The concept of the place where the employee habitually carries out his/her work was proposed by the EU to determine international jurisdiction and governing law. In international aviation law, the legislative purpose of the place where the employee habitually carries out his/her work is different from that of home base, which is a concept introduced for fatigue management of the crew in order to secure the aviation safety; thus the place where the employee habitually carries out his/her work and home base are not the same concept. In order to determine the place where the employee habitually carries out his/her work, following matters should be considered comprehensively; (i) where the crew starts and ends work, (ii) where the aircraft the crew is performing work on is primarily parked, (iii) where the crew is informed of the instructions and organizes his/her work activities, (iv) where the crew is obliged to reside according to the labor contract, (v) where there is an office provided by the employer and available to the crew, (vi) where the crew is obliged to be when he/she is ineligible for the work or subject to discipline. However, since all of the above items are the same as the location of the home base, it is reasonable to consider the home base as the most important factor when deciding on the place where the employee habitually carries out his/her work. In contrast, the state where the aircraft is registered (Article 17 of the Chicago Convention), should not be regarded as a place of where the employee habitually carries out his/her work. In this case, CJEU provided the first judging standard for the concept of the place where the employee engaged in international air transportation habitually carries out his/her work. It is the interpretation of the Brussels regulations which became a model -for the Korean Private International Act,- so it would be helpful to understand the concept of the place where the employee habitually carries out his/her work.

Development and Evaluation of Traffic Conflict Criteria at an intersection (교차로 교통상충기준 개발 및 평가에 관한 연구)

  • 하태준;박형규;박제진;박찬모
    • Journal of Korean Society of Transportation
    • /
    • v.20 no.2
    • /
    • pp.105-115
    • /
    • 2002
  • For many rears, traffic accident statistics are the most direct measure of safety for a signalized intersection. However it takes more than 2 or 3 yearn to collect certain accident data for adequate sample sizes. And the accident data itself is unreliable because of the difference between accident data recorded and accident that is actually occurred. Therefore, it is rather difficult to evaluate safety for a intersection by using accident data. For these reasons, traffic conflict technique(TCT) was developed as a buick and accurate counter-measure of safety for a intersection. However, the collected conflict data is not always reliable because there is absence of clear criteria for conflict. This study developed objective and accurate conflict criteria, which is shown below based on traffic engineering theory. Frist, the rear-end conflict is regarded, when the following vehicle takes evasive maneuver against the first vehicle within a certain distance, according to car-following theory. Second, lane-change conflict is regarded when the following vehicle takes evasive maneuver against first vehicle which is changing its lane within the minimum stopping distance of the following vehicle. Third, cross and opposing-left turn conflicts are regarded when the vehicle which receives green sign takes evasive maneuver against the vehicle which lost its right-of-way crossing a intersection. As a result of correlation analysis between conflict and accident, it is verified that the suggested conflict criteria in this study ave applicable. And it is proven that estimating safety evaluation for a intersection with conflict data is possible, according to the regression analysis preformed between accident and conflict, EPDO accident and conflict. Adopting the conflict criteria suggested in this study would be both quick and accurate method for diagnosing safety and operational deficiencies and for evaluation improvements at intersections. Further research is required to refine the suggested conflict criteria to extend its application. In addition, it is necessary to develope other types of conflict criteria, not included in this study, in later study.

A study on the developmental plan of Alarm Monitoring Service (기계경비의 발전적 대응방안에 관한 연구)

  • Chung, Tae-Hwang;So, Seung-Young
    • Korean Security Journal
    • /
    • no.22
    • /
    • pp.145-168
    • /
    • 2010
  • Since Alarm Monitoring Service was introduced in Korea in 1981, the market has been increasing and is expected to increase continually. Some factors such as the increase of social security need and the change of safety consciousness, increase of persons who live alone could be affected positively on Alarm Monitoring Service industry. As Alarm Monitoring Service come into wide use, the understanding of electronic security service is spread and consumer's demand is difficult, so consideration about new developmental plan is need to respond to the change actively. Electronic security system is consist of various kinds of element, so every element could do their role equally. Alarm Monitoring Service should satisfy consumer's various needs because it is not necessary commodity, also electronic security device could be easily operated and it's appearance has to have a good design. To solve the false alarm problem, detection sensor's improvement should be considered preferentially and development of new type of sensor that operate dissimilarly to replace former sensor is needed. On the other hand, to settle the matter that occurred by response time, security company could explain the limit on Alarm Monitoring System to consumer honestly and ask for an understanding. If consumer could be joined into security activity by security agent's explanation, better security service would be provided with mutual confidence. To save response time the consideration on the introduction of GIS(Global Information System) is needed rather than GPS(Global Positioning System). Although training program for security agents is important, several benefits for security agents should be considered together. The development of new business model is required for preparation against market stagnation and the development of new commodity to secure consumer for housing service rather than commercial facility service. for the purpose of those, new commodity related to home-network system and video surveillance system could be considered, also new added service with network between security company and consumer for a basis is to be considered.

  • PDF