• Title/Summary/Keyword: 센서 인증

Search Result 339, Processing Time 0.024 seconds

Classification of Location Verification in WSNs (무선 센서 네트워크 위치 검증 기법 분류)

  • Kim, In-hwan
    • The Journal of the Korea Contents Association
    • /
    • v.20 no.8
    • /
    • pp.359-367
    • /
    • 2020
  • WSNs as the main technology of IoT often deliver information or authenticate based on location. Thus, verifying location information is essential. This paper aims to present the comprehensive analysis and classification of location verification techniques in WSN. For this, classification criteria are suggested based on the result of feature analysis of existing techniques. In addition, the existing techniques are classified according to the suggested criteria, and each characteristic and development direction are described. The result of this paper is expected to be a useful reference material when designing a new technique.

Improving Performance of Human Action Recognition on Accelerometer Data (가속도 센서 데이터 기반의 행동 인식 모델 성능 향상 기법)

  • Nam, Jung-Woo;Kim, Jin-Heon
    • Journal of IKEEE
    • /
    • v.24 no.2
    • /
    • pp.523-528
    • /
    • 2020
  • With a widespread of sensor-rich mobile devices, the analysis of human activities becomes more general and simpler than ever before. In this paper, we propose two deep neural networks that efficiently and accurately perform human activity recognition (HAR) using tri-axial accelerometers. In combination with powerful modern deep learning techniques like batch normalization and LSTM networks, our model outperforms baseline approaches and establishes state-of-the-art results on WISDM dataset.

A Secure Authentication Protocol of Nodes between Cluster based on ECC (ECC 기반의 클러스터간 노드들의 안전한 인증 프로토콜)

  • Jeong, Yoon-Su;Kim, Yong-Tae;Lee, Sang-Ho
    • Journal of the Korea Society of Computer and Information
    • /
    • v.13 no.2
    • /
    • pp.167-175
    • /
    • 2008
  • The current pre-distribution of secret keys uses a-composite random key and it randomly allocates keys. But there exists high probability not to be public-key among nodes and it is not efficient to find public-key because of the problem for time and energy consumption. We presents key establishment scheme designed to satisfy authentication and confidentiality, without the need of a key distribution center. Proposed scheme is scalable since every node only needs to hold a small number of keys independent of the network size, and it is resilient against node capture and replication due to the fact that keys are localized. In simulation result, we estimate process time of parameter used in proposed scheme and efficiency of Proposed scheme even if increase ECC key length.

  • PDF

A Study on Standards for Performance Evaluation of Biometric Recognition Systems (국내 생체 인식 시스템 성능 평가를 위한 표준안 연구)

  • 문지현;김학일
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.12 no.2
    • /
    • pp.101-110
    • /
    • 2002
  • The purpose of this research is to establish Korean standards of best practice and common criteria for testing and evaluating the performance of biometric recognition systems. First of all, research activities in leading countries such as USA, Great Britain and Germany have been studied and analyzed. Then, the standards of best practice and common criteria are proposed in the aspects of sensors, algorithms, and application systems. The results of this work will be utilized fur test and evaluation of commercial biometric products by KISA and provided to private industries for their own evaluation of products.

Research on Secure IoT Lightweight Protocols (사물인터넷용 경량 프로토콜 비교 연구)

  • Sunghyuck Hong
    • Advanced Industrial SCIence
    • /
    • v.2 no.1
    • /
    • pp.1-7
    • /
    • 2023
  • The use of Internet of Things(IoT) in smart cities and smart homes is essential. The security of the sensor nodes, which are the core of the IoT, is weak and hacking attacks are severe enough to have a fatal impact on real life. This research is conducted to improve the security of the Internet of Things by developing a lightweight secure communication protocol for the Internet of Things, and to build a safe Internet of Things environment suitable for the era of the 4th Industrial Revolution. It contributes to building a safe and convenient smart city and smart home by proposing key management and identifier development to increase the confidentiality of communication and the establishment of an Internet authentication system.

Analyses of Requirement of Integrated Security for Secure Internet of Things (안전한 사물인터넷망의 융합 보안을 위한 요구사항 분석)

  • Kim, Jung Tae
    • Asia-pacific Journal of Multimedia Services Convergent with Art, Humanities, and Sociology
    • /
    • v.5 no.4
    • /
    • pp.667-674
    • /
    • 2015
  • Internet of things (IoT) has been a focus of research and widespread. Security and privacy are the key issues for IoT applications, and still faced with some enormous challenges. In order to facilitate this emerging domain, we analyzed the research progress of IoT, and pay attention to the security. By means of deeply analyzing the security architecture and features, the security requirements are required. And, we surveyed the demands and requirements.

Smart Unmanned Courier Locker (스마트 무인 택배함)

  • Jang, Eun-Gyeom;Jung, Hyun-Moon;Jung, Yi-Sak;Kim, Min-Seong;Oh, Seung-Hoon
    • Proceedings of the Korean Society of Computer Information Conference
    • /
    • 2020.01a
    • /
    • pp.125-126
    • /
    • 2020
  • 본 프로젝트는 고객과 택배기사가 배송과정에서 겪는 불편함을 해소하기 위해 App과 IoT센서를 연동하여 배송과정의 편의성을 제공하는 무인 택배함이다. 기존 택배함의 비밀번호를 사용하는 방식이 아닌 택배함에 부착되어있는 NFC 태그 스캔을 통하여 편리하게 물품을 배송 및 보관할 수 있도록 하였다. App은 택배기사와 고객으로 나뉘어 있으며 택배기사 App의 주요 기능은 운송장 번호를 스캔하여 물품을 보관할 여러 택배함 중 하나를 선택하여 해당 택배함의 도어락을 제어하는 기능이 있으며, 고객 App의 주요 기능은 NFC 스캔을 통해 물품이 보관된 택배함 또는 보관할 택배함을 선택하여 도어락을 제어하는 기능이 있다. 그 외에 택배기사 App은 배송 목록 조회, 내 정보 확인 등의 서비스를 제공하고 있으며, 고객 App은 택배 예약, 예약 조회 등의 서비스를 제공하고 있다. 택배함은 와이파이 모듈을 통해 서버와 통신할 수 있도록 하였으며, 충격센서와 Mp3 모듈을 사용하여 택배함에 충격을 가하면 경보음이 울리도록 설계하였다.

  • PDF

Design and Implementation of Factory Equipment Monitoring System using Grid-based Key Pre-Distribution (그리드 기반 키 선분배 방식을 사용하는 공장 설비 모니터링 시스템 설계 및 구현)

  • CHO, YANGHUI;PARK, JAEPYO;YANG, SEUNGMIN
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.17 no.11
    • /
    • pp.51-56
    • /
    • 2016
  • In this paper, we propose an Arduino-based plant monitoring system. The proposed system is based on the Arduino platform, using an environmental sensor and a pressure sensor for measuring temperature, humidity and illuminance in order to monitor the state of the environment and the facilities of the plant. Monitoring data are transmitted to a ZigBee coordinator connected to a server through a radio frequency transceiver. When using a pressure sensor and the environment sensor data stored on the host server, checking the pressure in the environment of the plant and equipment is intended to report any alarm status to the administrator. Using a grid line-based key distribution scheme, the authentication node dynamically generates a data key to protect the monitoring information. Applying a ZigBee wireless sensor network does not require additional wiring for the actual implementation of a plant monitoring system. Possible working-environment monitoring of an efficient plant can help analyze the cause of any failure by backtracking the working environment when a failure occurs. In addition, it is easy to expand or add a sensor function using the Arduino platform and an expansion board.

Evaluation of the Usability of Micro-Sensors for the Portable Fine Particle Measurement (생활 속 미세먼지 영향평가를 위한 소형센서의 신뢰성 및 활용성 평가)

  • Kim, Jinsu;Jang, Youjung;Kim, Jinseok;Park, Minwoo;Bu, Chanjong;Lee, Yungu;Kim, Younha;Woo, Jung-Hun
    • Journal of Environmental Impact Assessment
    • /
    • v.27 no.4
    • /
    • pp.378-393
    • /
    • 2018
  • As atmospheric fine dust problems in Korea become more serious, there are growing needs to find the concentration of fine particles in indoor and outdoor areas and there are increasing demands for sensor-based portable monitoring devices capable of measuring fine dust concentrations instantly. The low-cost portable monitoring devices have been widely manufactured and used without the prescribed certification standards which would cause unnecessary confusion to the concerned public. To evaluate the reliability those devices and to improve their usability, following studies were conducted in this work; 1) The comparisons between sensor-based devices and comparison with more accurate devices were performed. 2) Several experiments were conducted to understand usefulness of the portable monitoring devices. As results, the absolute concentration levels need to be adjusted due to insensitivity of the tiny light scattering sensors in the portable devices, but their linearity and reproducibility seem to be acceptable. By using those monitoring devices, users are expected to have benefits of recognizing the changes of concentration more quickly and could help preventing themselves from the adverse health impacts.

Dynamic Threshold Determination Method for Energy Efficient SEF using Fuzzy Logic in Wireless Sensor Networks (무선 센서 네트워크에서 통계적 여과 기법의 에너지 효율 향상을 위한 퍼지논리를 적용한 동적 경계값 결정 기법)

  • Choi, Hyeon-Myeong;Lee, Sun-Ho;Cho, Tae-Ho
    • Journal of the Korea Society for Simulation
    • /
    • v.19 no.1
    • /
    • pp.53-61
    • /
    • 2010
  • In wireless sensor networks(WSNs) individual sensor nodes are subject to security compromises. An adversary can physically capture sensor nodes and obtain the security information. And the adversary injects false reports into the network using compromised nodes. If undetected, these false reports are forwarded to the base station. False reports injection attacks can not only result in false alarms but also depletion of the limited amount of energy in battery powered sensor nodes. To combat these false reports injection attacks, several filtering schemes have been proposed. The statistical en-routing filtering(SEF) scheme can detect and drop false reports during the forwarding process. In SEF, The number of the message authentication codes(threshold) is important for detecting false reports and saving energy. In this paper, we propose a dynamic threshold determination method for energy efficient SEF using fuzzy-logic in wireless sensor networks. The proposed method consider false reports rate and the number of compromised partitions. If low rate of false reports in the networks, the threshold should low. If high rate of false reports in networks, the threshold should high. We evaluated the proposed method’s performance via simulation.