• Title/Summary/Keyword: 스마트워크 보안 등

Search Result 162, Processing Time 0.037 seconds

A Secure and Efficient Management Scheme based Heterogeneous RFIDs for Ubiquitous Environments (유비쿼터스 환경에서의 안전하고 효율적인 이종 RFID 관리 기법)

  • Seo, Dae-Hee;Baek, Jang-Mi;Cho, Dong-Sub
    • Journal of KIISE:Information Networking
    • /
    • v.36 no.4
    • /
    • pp.275-285
    • /
    • 2009
  • RFID technology using the smart tag technology as a part of the sensor network is currently in the spotlight. But there are still many problems in applying the technology in a ubiquitous environment, induding at the point when anybody can read the tag information and the authentication between the tag and the reader, and security problems in very low-cost smart tag implementation. The proposed scheme is designed to enhance security and efficiency related to various services required in RF networks, based on the reliable peripheral devices for users of passive RFID tag. Using passive RFID tag, which has been applied to authentication transactions in existing papers, this study also proposed an appropriate management scheme that is suitable for a dynamic environment and setting a temporary group to provide various services. also proposed scheme is support RFID grouping, temporary group of service and security servicce, improved efficiency of communication.

A Study of Pervasive Roaming Services with Security Management Framework (퍼베이시브 로밍 서비스를 위한 보안 관리 프레임워크)

  • Kim, Gwan-Yeon;Hwang, Zi-On;Kim, Yong;Uhm, Yoon-Sik;Park, Se-Hyun
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.17 no.4
    • /
    • pp.115-129
    • /
    • 2007
  • The ubiquitous and autonomic computing environments is open and dynamic providing the universal wireless access through seamless integration of software and system architectures. The ubiquitous computing have to offer the user-centric pervasive services according to the wireless access. Therefore the roaming services with the predefined security associations among all of the mobile devices in various networks is especially complex and difficult. Furthermore, there has been little study of security coordination for realistic autonomic system capable of authenticating users with different kinds of user interfaces, efficient context modeling with user profiles on Smart Cards, and providing pervasive access service by setting roaming agreements with a variety of wireless network operators. This paper proposes a Roaming Coordinator-based security management framework that supports the capability of interoperator roaming with the pervasive security services among the push service based network domains. Compared to traditional mobile systems in which a Universal Subscriber Identity Module(USIM) is dedicated to one service domain only, our proposed system with Roaming Coordinator is more open, secure, and easy to update for security services throughout the different network domains such as public wireless local area networks(PWLANs), 3G cellular networks and wireless metropolitan area networks(WMANs).

A DDoS Attack Detection of private mobile network using Time Series Analysis (시계열 분석을 적용한 사설 모바일 네트워크의 DDoS 공격 탐지)

  • Kim, Dae Hwan;Lee, Soo Jin;Pyo, Sang Ho
    • Convergence Security Journal
    • /
    • v.16 no.4
    • /
    • pp.17-24
    • /
    • 2016
  • Many companies and organizations are building a mobile office environment using the LTE network, the national disaster network and Air Force LTE network are built for public safety and national defense. However the recent threats on information security have been evolving from information leakage to DDoS attacks to neutralize the service. Especially, the type of device such as Smart phones, smart pad, tablet PC, and the numbers are growing exponentially and As performance of mobile device and speed of line develop rapidly, DDoS attacks in the mobile environment is becoming a threat. So far, universal countermeasure to DDoS attacks has been interception the network and server step, Yet problem regarding DDoS attack traffic on mobile network and expenditure of network resources still remains. Therefore, this paper analyzes the traffic type distributed in the private mobile network such as the National Disaster Network, and Air Force LTE network in order to preemptively detect DDoS attacks on terminal step. However, as direct analysis on traffic distributed in the National Disaster Network, and Air Force LTE network is restricted, transmission traffics in Minecraft and uploading video file upload which exhibit similar traffic information are analyzed in time series, thereby verifing its effectiveness through establishment of DDoS attacks standard in mobile network and application that detects and protects DDoS attacks

Efficient Scheduling of Sensor-based Elevator Systems in Smart Buildings (스마트 빌딩을 위한 센서 기반의 효율적인 엘리베이터 스케줄링)

  • Bahn, Hyokyung
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.17 no.10
    • /
    • pp.367-372
    • /
    • 2016
  • In a modern smart building, sensors can detect various physical conditions, such as temperature, humidity, sound, motion, and light, which can be used in medical services and security, and for energy savings. This paper presents an efficient elevator scheduling system that utilizes smart sensor technologies with radio-frequency identification, video, and floor sensors to detect the arrival of elevator users in advance. The detected information is then delivered to the elevator scheduling system via building networks. By using this information, the proposed system makes a reservation call for efficient control of the elevator's direction and time. Experiments under a spectrum of traffic conditions show that the proposed system performs better than a legacy system with respect to average wait time, maximum wait time, and energy consumption.

Implementation of Home Network Services Using OpenWRT-based Wireless Access Point and Zigbee Communications (OpenWRT 기반 유무선 공유기와 Zigbee 통신을 이용한 홈 네트워크 서비스 구축)

  • Kwon, Kisu;Lee, Kyoung-Hee
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.22 no.2
    • /
    • pp.375-381
    • /
    • 2018
  • As smart home network services such as home CCTV, outdoor control of home appliances, home security and disaster prevention services become popular, there appear various affiliated products including smart home gateway and smart speaker. Since those services are generally developed on the vendors' individual hardware and software platforms, it is not much expected for them to interwork well among different architecture and communication methods. In this paper, we propose a new home network service system running on an open source platform to address such issues. We implemented a home network system using OpenWRT-based wireless router(or access point) and Zigbee communication technology. In the proposed system, a wireless router replaces a commercial home gateway and small control units implemented with Arduino control electronic devices and sensors in home. Several service scenarios are also implemented to verify the operability of the proposed system.

Analysis of the Routing Path Tracking Technology for Mobility Host (이동성 호스트를 위한 라우팅 경로 추적 기술 분석)

  • Park, Jin-tae;Phyo, Gyung-soo;Moon, Il-young
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2016.05a
    • /
    • pp.638-640
    • /
    • 2016
  • Recently, Humanity enter the super-connection generation that linking human and things as a result of the development ICT technologies. IoT technology is growing rapidly as a result of IoT technology appearance and development of smart device, technology expansion, the spread of smart sensors, spread diffusion of smart devices, construction of a variety of network. These techniques are applied to those having a mobility is growing importance of network technology. Real-time service and features, such as the accuracy of the data it became important. In order to implement the IoT will need to take into account IP, security, a lot of things such as a service model, but in this paper, want to discuss mobility, for the tracking technology of routing path for efficient service delivery of the host. Therefore, in this paper, the routing path that is currently study examined the tracking technology, we try to refer to routing method of the future of the mobile host.

  • PDF

CoAP/6LoWPAN-based Smart Home Network system using DTLS (DTLS 보안기술이 적용된 CoAP/6LoWPAN 기반의 스마트 홈네트워크 시스템)

  • Kim, Yeon-Su;Kim, Ki-Tae;Lee, Bo-Kyung
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.18 no.6
    • /
    • pp.53-61
    • /
    • 2018
  • Recently, technologies related to the Internet of Things have developed rapidly and research on mobile environment home network systems is actively in progress. The Internet Engineering Task Force (IETF) Working Group proposed the CoAP/6LoWPAN technology as a suitable protocol for internetworking IoT devices with the Internet in a limited environment and adopting it as a standard. However, the existing home network systems hardly include security protocols. IETF recommends DTLS(Datagram Transport Layer Security) on UDP as security protocol suitable for IoT environments. In this paper, smart home network system based on CoAP/6LoWPAN by using DTLS is implemented in mobile environments. The data transfer time is measured according to each procedure of the DTLS protocol and the need to improve DTLS protocol is suggested.

IP Camera Hacking Analysis And Measure (IP카메라 해킹 분석과 대책)

  • Han, Sang-Hoon;Jang, Jin-Hui;Kang, Gil-Uk;Park, Han-Sol
    • Proceedings of the Korean Society of Computer Information Conference
    • /
    • 2018.01a
    • /
    • pp.165-166
    • /
    • 2018
  • IP카메라는 CCTV와 달리 값도 저렴하고 네트워크와 연결돼 PC와 스마트 폰을 통해서 실시간 조회 및 제어가 가능한 카메라이다. 이러한 장점에 힘입어 일반 가정이나 매장 등에서 도난 방지 및 감시를 위해 IP 카메라를 사용하는 사람들이 급격히 증가하고 있으며, 이에 따라 해킹을 통한 사생활 침해 문제도 같이 증가하고 있다. 이는 사용자들의 보안 인식이 턱없이 부족해 전문가가 아니더라도 손쉽게 프로그램과 사이트를 이용하여 해킹이 가능하기 때문인 것으로 사료된다. 따라서 본 논문에서는 해킹이 얼마나 쉽게 이뤄지는지, 어떠한 피해가 있는지, 그리고 이에 대한 해결방안을 제안한다.

  • PDF

New consensus algorithm against 51% attack (51% 공격에 저항 가능한 신규 합의 알고리즘)

  • Kim, In-Yeung;Park, Ji-Soo;Lee, Chang-Hoon
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2018.10a
    • /
    • pp.288-291
    • /
    • 2018
  • 블록체인은 암호화폐의 기반이 되는 기술로 데이터를 P2P 분산 방식으로 체인 형태로 기록하여 보안성과 안전성을 갖?다. 중앙 집권화에서 벗어나 사용자들의 네트워크에서 자유롭고 안전한 거래를 가능하게 하는 블록체인은 현재 스마트 계약, 암호화폐, 개인 정보 인증 등 다양한 방법으로 활용되고 있다. 블록체인 사용자들은 거래의 안전성을 위해 채굴이라는 과정으로 블록을 인증하는데 절반 이상의 해시파워를 가진 공격자가 거래내역을 조작하는 것이 51% attack이다. 채굴자들은 채굴을 위해 전문 장비를 개발하고 이익을 도모하기 위해 모이면서 큰 집단으로 모이면서 51% attack에 대한 공격가능성이 높아졌고 실제로 엄청난 피해를 입힌 공격 사례가 있다. 따라서 본 논문은 51% attack의 사례와 기존 대응방안인 PoS 방식과 dPoW 방식 및 각 방식에 대한 한계를 분석하였고 이를 보완한 새로운 블록체인 모델을 제안한다.

A Technology-Strategy Integrated Digital Forensic Process Framework Considering Government ICT R&D Strategy and ICT Paradigm Shift (정부 ICT R&D 중장기전략과 ICT 패러다임 변화를 반영한 디지털 포렌식 표준정립을 위한 기술-정책적 통합프로세스 프레임워크)

  • Shin, Jun Woo
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.18 no.7
    • /
    • pp.1495-1504
    • /
    • 2014
  • Currently information related service such as internet banking, chatting, social network services are quite well smeared into our daily life. Moreover, a rapid growth of service using smart devices brought an importance of security in internet services and a research activation of digital forensic in a crime investigation. This paper presented a previous digital forensic research trend and based on this, suggested a technology-strategy integrated digital forensic process platform, taking a mid-long term government leading ICT R&D strategy and ICT paradigm shift into account.