• Title/Summary/Keyword: 스마트 안전모

Search Result 136, Processing Time 0.023 seconds

Development of Baby Care Mobile Application Using Smart Sensor (스마트 센서를 이용한 Baby Care 모바일 어플리케이션 개발)

  • Chung, Jae-Pil
    • Journal of Advanced Navigation Technology
    • /
    • v.19 no.6
    • /
    • pp.643-647
    • /
    • 2015
  • Nowadays, ubiquitous technology which combines sensors and network technology is emerging and it is called ubiquitous sensor network (USN). In this paper, mobile application for baby care using smart sensor is proposed. The proposed mobile application consists of mobile networks to transfer the information. It detects various information such as falling detecting, crying and fever detecting of infants. It keeps infants from external threats. The developed mobile application will be examined by simulation.

Remote User Authentication Scheme using Smart Cards (스마트카드를 이용한 원격 사용자 인증 구조)

  • Choi, Jong-Seok;Shin, Seung-Soo
    • The Journal of the Korea Contents Association
    • /
    • v.9 no.2
    • /
    • pp.36-42
    • /
    • 2009
  • In 2005, Chien and Chen proposed a remote user authentication scheme for preserving user anonymity to conquer some problems Das et. al. schemes have. In 2007, Hu et. al. pointed out that their scheme have some problems. Therefore, they proposed a new one and claimed that their scheme overcome all of these problems. However, We will show that Hu et. al. scheme still hold some problems; it cannot resist to denial of service attack and protect the user anonymity. Hence, we propose ours and demonstrate our scheme conquer these problems.

A New Universally Verifiable and Receipt-free Electronic Voting Scheme Through Public Channel by Using Smartcard (스마트카드를 이용하여 공개채널로 매표방지와 전체검증을 제공하는 전자선거기법)

  • 김형석;김상진;오희국
    • Proceedings of the Korea Institutes of Information Security and Cryptology Conference
    • /
    • 2003.12a
    • /
    • pp.605-610
    • /
    • 2003
  • 선거를 전자적으로 구성하기 위해서는 비밀성(privacy), 선거권(eligibility) 등과 함께 전체검증(universal verifiability)과 매표방지(receipt-freeness) 속성을 반드시 제공해야 한다. 지금까지 제안된 전자선거 기법은 매표방지와 전체검증을 제공하기 위해 도청 불가능한 채널이라는 물리적인 가정 하에 이루어지거나 하드웨어 장치를 이용하더라도 장치에 대한 신뢰가 가정되었다. 본 논문에서는 믹스 서버나 랜덤마이저의 역할을 스마트카드와 같은 안전한 하드웨어 장치가 하므로 물리적 가정 없이 효율적으로 구현한다. 제안한 시스템은 표를 섞는 과정에서 permutation matrix를 사용하여 증명하므로 증명의 회수가 적고 간단하여 효율적이다. 또한, 지금까지 제안된 대부분의 선거 기법은 ElGamal 암호시스템의 준동형 특성을 이용하여 모든 표를 결합한 다음 해독하여 집계를 계산하는데 이는 이산대수 문제를 효율적으로 해결할 수 있어야 가능했다. 이 논문에서는 ElGamal 암호시스템과 다차잉여 기반 암호알고리즘인 Naccacne 암호알고리즘을 결합하여 표를 인코딩 함으로써 유권자의 수가 많은 선거에 대해서도 다항 시간 내에 집계가 가능하다.

  • PDF

자율주행 기반 스마트 모빌리티

  • Mun, Yeong-Jun
    • Broadcasting and Media Magazine
    • /
    • v.24 no.1
    • /
    • pp.49-55
    • /
    • 2019
  • 최근 수년간 급속도로 발전한 정보통신(ICT) 및 인공지능(AI) 관련 기술은 사회전반에 걸쳐 모든 산업영역에 변화의 바람을 불러일으키고 있다. 교통부문에서도 이러한 기술의 융 복합을 통해 교통체계의 효율성과 안전성을 향상시키기 위한 노력이 자율주행의 기술발전으로 나타나고 있다. 자율주행은 그동안 인간이 운전해오던 자동차 중심의 교통체계에 혁신적인 변화의 동인이 될 것으로 전망된다. 개인 승용차 시장에 자율주행자동차의 등장과 버스, 택시 등 대중교통과 공유교통차량의 대중교통 기능 적용, 그리고 트럭 및 대형버스 등 상용차의 군집주행기술 도입 등 다양한 분야에서 산업화가 진행되고 있는 것이 그 이유다. 이로 인해 시민들의 일상생활에서 가장 중요한 부분을 차지하는 이동성(Mobility)을 제공하는 서비스에 상당한 영향을 줄 것으로 예측되고 있다. 본 고는 자율주행이 가져올 미래 교통체계의 변화로 대변되는 스마트 모빌리티에 대한 기술과 서비스 방향에 대해 진단하고, 효율적인 산업화를 위한 방안을 제시한다.

Transaction Model Suggestion by using Two Enforcements with a Blockchain based on a Service Platform (서비스 플랫폼 기반 이중강화적용 블록체인 응용 거래모델 제안)

  • Lee, Kwan Mok;Kim, Yong Hwan;Bae, Ki Tae
    • Smart Media Journal
    • /
    • v.9 no.4
    • /
    • pp.91-96
    • /
    • 2020
  • A blockchain is a technology in which all nodes participating in a distributed network manage each transaction's contents without a central server managing the transaction, which is a record of the transaction. The block containing the transaction record of a specific period is connected to the blockchain by referring to the hash value for the previous block, and the chain with the new block added is shared with all nodes again. Transactions using existing certificates will pass through FinTech, and in the near future, applications using blockchains are expected to emerge. In this study, we analyze the problems of the existing model, and propose a transaction model that applies the blockchain to come. Among various applications, this study develops a trading model targeting the energy sales market among the topics that will lead the fourth industrial revolution. As a result of analyzing the proposed model, it was possible to be sure of the possibility of a safer energy sales transaction than the existing method.

An Overview of False Data Injection Attack Against Cyber Physical Power System (사이버 물리 전력 시스템에 대한 허위 데이터 주입 공격에 관한 고찰)

  • Bae, Junhyung
    • Journal of IKEEE
    • /
    • v.26 no.3
    • /
    • pp.389-395
    • /
    • 2022
  • With the evolution of technology, cyber physical systems (CPSs) are being upgraded, and new types of cyber attacks are being discovered accordingly. There are many forms of cyber attack, and all cyber attacks are made to manipulate the target systems. A representative system among cyber physical systems is a cyber physical power system (CPPS), that is, a smart grid. Smart grid is a new type of power system that provides reliable, safe, and efficient energy transmission and distribution. In this paper, specific types of cyber attacks well known as false data injection attacks targeting state estimation and energy distribution of smart grid, and protection strategies for defense of these attacks and dynamic monitoring for detection are described.

Secure Data Transaction Protocol for Privacy Protection in Smart Grid Environment (스마트 그리드 환경에서 프라이버시 보호를 위한 안전한 데이터 전송 프로토콜)

  • Go, Woong;Kwak, Jin
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.16 no.8
    • /
    • pp.1701-1710
    • /
    • 2012
  • Recently, it has been found that it is important to use a smart grid to reduce greenhouse-gas emissions worldwide. A smart grid is a digitally enabled electrical grid that gathers, distributes, and acts on information regarding the behavior of all participants (suppliers and consumers) to improve the efficiency, importance, reliability, economics, and sustainability of electricity services. The smart grid technology uses two-way communication, where users can monitor and limit the electricity consumption of their home appliances in real time. Likewise, power companies can monitor and limit the electricity consumption of home appliances for stabilization of the electricity supply. However, if information regarding the measured electricity consumption of a user is leaked, serious privacy issues may arise, as such information may be used as a source of data mining of the electricity consumption patterns or life cycles of home residents. In this paper, we propose a data transaction protocol for privacy protection in a smart grid. In addition, a power company cannot decrypt an encrypted home appliance ID without the user's password.

Derivation of Security Requirements of Smart Factory Based on STRIDE Threat Modeling (STRIDE 위협 모델링에 기반한 스마트팩토리 보안 요구사항 도출)

  • Park, Eun-ju;Kim, Seung-joo
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.27 no.6
    • /
    • pp.1467-1482
    • /
    • 2017
  • Recently, Interests on The Fourth Industrial Revolution has been increased. In the manufacturing sector, the introduction of Smart Factory, which automates and intelligent all stages of manufacturing based on Cyber Physical System (CPS) technology, is spreading. The complexity and uncertainty of smart factories are likely to cause unexpected problems, which can lead to manufacturing process interruptions, malfunctions, and leakage of important information to the enterprise. It is emphasized that there is a need to perform systematic management by analyzing the threats to the Smart Factory. Therefore, this paper systematically identifies the threats using the STRIDE threat modeling technique using the data flow diagram of the overall production process procedure of Smart Factory. Then, using the Attack Tree, we analyze the risks and ultimately derive a checklist. The checklist provides quantitative data that can be used for future safety verification and security guideline production of Smart Factory.

Smart Livestock Research and Technology Trend Analysis based on Intelligent Information Technology to improve Livestock Productivity and Livestock Environment (축산물 생산성 향상 및 축산 환경 개선을 위한 지능정보기술 기반 스마트 축사 연구 및 기술 동향 분석)

  • Kim, Cheol-Rim;Kim, Seungchoen
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.22 no.4
    • /
    • pp.133-139
    • /
    • 2022
  • Recently, livestock farms in Korea are introducing data-based technologies to improve productivity, such as livestock environment and breeding management, safe livestock production, and animal welfare. In addition, the government has been conducting a smart livestock distribution project since 2017 through the modernization of ICT-based livestock facilities in order to improve the productivity of livestock products and improve the livestock environment as a policy. However, the current smart livestock house has limitations in connection, diversity, and integration between monitoring and control. Therefore, in order to intelligently systemize all processes of livestock with intelligent algorithms and remote control in order to link and integrate various monitoring and control, the Internet of Things, big data, artificial intelligence, cloud computing, and mobile It is necessary to develop a smart livestock system. In this study, domestic and foreign research trends related to smart livestock based on intelligent information technology were introduced and the limitations of domestic application of advanced technologies were analyzed. Finally, future intelligent information technology applicable to the livestock field was examined.

Contract-based Access Control Method for NFT Use Rights

  • Jeong, Yoonsung;Ko, Deokyoon;Seo, Jungwon;Park, Sooyong;Kim, Seong-Jin;Kim, Bum-Soo;Kim, Do-Young
    • Journal of the Korea Society of Computer and Information
    • /
    • v.27 no.11
    • /
    • pp.1-11
    • /
    • 2022
  • In this paper, we propose an NFT(Non-Fungible Token)-based access control method for safely sharing data between users in blockchain environment. Since all data stored in the blockchain can be accessed by anyone due to the nature of the technology, it is necessary to control access except for authorized users when sharing sensitive data. For that, we generate each data as NFT and controls access to the data through the smart contract. In addition, in order to overcome the limitations of single ownership of the existing NFT, we separated the NFT into ownership and use rights, so that data can be safely shared between users. Ownership is represented as an original NFT, use rights is represented as a copied NFT, and all data generated as NFT is encrypted and uploaded, so data can be shared only through the smart contract with access control. To verify this approach, we set up a hypothetical scenario called Building Information Modeling (BIM) data trade, and deployed a smart contract that satisfies 32 function call scenarios that require access control. Also, we evaluated the stability in consideration of the possibility of decryption through brute-force attack. Through our approach, we confirmed that the data can be safely shared between users in blockchain environment.