• Title/Summary/Keyword: 스마트 안전 시스템

Search Result 875, Processing Time 0.033 seconds

A Study on Improvement of Used-goods Market Platform Using Blockchain (블록체인을 이용한 중고거래 플랫폼 개선방안 연구)

  • Lee, Kyoung-Nam;Jeon, Gyeahyung
    • Journal of Digital Convergence
    • /
    • v.16 no.9
    • /
    • pp.133-145
    • /
    • 2018
  • This study was investigated the necessity and possibility of using block-chain technology in online used-goods trading platform. Current online used-goods trading platforms operate a safety trading system, but it is difficult to utilize due to relatively high commission rate. As a result, people mainly use the method of meeting and purchasing in person, which is a relatively costly method. This study discusses how to build a platform to solve or mitigate problems such as privacy, information distortion and omission, fraud, etc. In the platform proposed in this study, it is possible to solve the major fraud and personal information protection problems that may occur in the transaction proceeding by appropriately reflecting the types and characteristics of the block-chain technology. In future work, we will discuss legal framework and technology development plan to apply the proposed platform in this study.

A Design of Certificate Password Recovery Using Decentralized Identifier (DID를 사용한 인증서 암호 복구)

  • Kim, Hyeong-uk;Kim, Sang-jin;Kim, Tae-jin;Yu, Hyeong-geun
    • Journal of Venture Innovation
    • /
    • v.2 no.2
    • /
    • pp.21-29
    • /
    • 2019
  • In the public certificate technology commonly used in Korea, users have a cumbersome problem of always resetting when they forget their password. In this paper, as a solution to this problem, we propose a secure authentication certificate password recovery protocol using blockchain, PKI, and DID for distributed storage. DID is a schema for protecting block ID in blockchain system. The private key used in the PKI is configured as a user's biometric, for example, a fingerprint, so that it can completely replace the memory of the complex private key. To this end, based on the FIDO authentication technology that most users currently use on their smartphones, the process of authenticating a user to access data inside the block minimizes the risk of an attacker taking over the data.

SPN Block cipher SSB having same structure in encryption and decryption (암호와 복호가 동일한 SPN 블록 암호 SSB)

  • Cho, Gyeong-Yeon
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.15 no.4
    • /
    • pp.860-868
    • /
    • 2011
  • Feistel and SPN are the two main structures in a block cipher. Feistel is a symmetric structure which has the same structure in encryption and decryption, but SPN is not a symmetric structure. In this paper, we propose a SPN block cipher so called SSB which has a symmetric structure in encryption and decryption. The proposed SSB is composed of the even numbers of N rounds. Each round consists of a round key addition layer, a subsitution layer, a byte exchange layer and a diffusion layer. The subsitution layer of the odd round is inverse function of one of the even round. And the diffusion layer is a MDS involution matrix. The differential and linear attack probability of SSB is $2^{-306}$ which is same with AES. The proposed symmetric SPN block cipher SSB is believed to construct a safe and efficient cipher in Smart Card and RFID environments which is in limited hardware and software resources.

ADAM: An Approach of Digital Asset Management system (사후 디지털 자산 관리 시스템에 관한 연구)

  • Moon, Jeong-Kyung;Kim, Hwang-Rae;Kim, Jin-Mook
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.16 no.9
    • /
    • pp.1977-1982
    • /
    • 2012
  • Social network service user or smart phone user is very convenient, because there are supported to various social network services such as Facebook, Twitter, Flickr, Naver blog, Daum blog, and so on. This Is very good because they store multimedia datas that user wants to cyber space if they want it conveniently. But, if social network user increases, space of cloud storage increases sharply, and when social network service used user dies then they have big problems such as they did not know in existing. Typically, problems of notice, dissemination, storage, and inheritance for digital asset can happen representatively. Now, If successor send relation information of he and his dead user that is family to social network service provider then service provider checks it. And successor may can use, save and only backup are possible after confirm of family relation truth. Therefore, We wish to propose ADAM that successor may can inherit digital assets easily, conveniently, and safely in this paper. If someone use ADAM, successor submits information about dead and own family relation in the third certification party. And ADAM can be inherited freely and conveniently about digital assets as general assets passing through right inheritance process.

A Survey of applying Fully Homomorphic Encryption in the Cloud system (클라우드 컴퓨팅 환경에서의 개인정보보호를 위한 완전 동형 암호 적용 방안 고찰)

  • Kim, Sehwan;Yoon, Hyunsoo
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.24 no.5
    • /
    • pp.941-949
    • /
    • 2014
  • Demands for cloud computing service rapidly increased along with the expansion of supplying smart devices. Interest in cloud system has led to the question whether it is really safe. Due to the nature of cloud system, cloud service provider can get a user's private information and disclose it. There is a large range of opinion on this issue and recently many researchers are looking into fully homomorphic encryption as a solution for this problem. Fully homomorphic encryption can permit arbitrary computation on encrypted data. Many security threats will disappear by using fully homomorphic encryption, because fully homomorphic encryption keeps the confidentiality. In this paper, we research possible security threats in cloud computing service and study on the application method of fully homomorphic encryption for cloud computing system.

Authentication Scheme based on NTRU for the Protection of Payment Information in NFC Mobile Environment (NFC 모바일 환경에서 결제정보보호를 위한 NTRU 기반 인증 기법)

  • Park, Sung Wook;Lee, Im Yeong
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.2 no.3
    • /
    • pp.133-142
    • /
    • 2013
  • Recently, smart devices for various services have been developed using converged telecommunications, and the markets for near field communication (NFC) mobile services is expected to grow rapidly. In particular, the realization of mobile NFC payment services is expected to go commercial, and it is widely attracting attention both on a domestic and global level. However, this realization would increase privacy infringement, as personal information is extensively used in the NFC technology. One example of such privacy infringement would be the case of the Google wallet service. In this paper, we propose an mutual authentication scheme based on NTRU for secure channel in OTA and an zero-knowledge proof scheme NTRU based on for protecting user information in NFC mobile payment systems without directly using private financial information of the user.

Mobile Application Development for Irrigation Facilities and water Management (수리시설 및 물 관리를 위한 모바일 어플리케이션 개발)

  • Kim, Jin-Taek;Oh, Seoung-Tae;La, Min-Chul
    • Proceedings of the Korea Water Resources Association Conference
    • /
    • 2012.05a
    • /
    • pp.443-443
    • /
    • 2012
  • 최근 지구 온난화 및 기후변화로 인하여 국지적 집중호우에 의한 농지 침수 및 유실 피해가 점차 증가 추세에 있으며 가뭄에 의한 물 부족 현상도 심화되고 있다. 이와 같은 홍수 및 가뭄 피해에 대비하기 위하여 농업용 저수지와 수문 그리고 농수로와 같은 농업수리시설물이 신축 운영되고 있으나 이들 시설물은 비교적 규모가 작은 대신에 그 수가 매우 많고 또한 지역적으로 널리 산재해 있기 때문에 관리자가 이들을 효율적으로 운영하고 관리하는데 한계가 있다는 특징이 있다. 더욱이 이들 시설물은 물과 항상 접하는 철근 콘크리트 구조물로 이루어져 있어서 시간이 경과함에 따라 균열발생과 철근부식과 같은 노후화 현상이 뚜렷하게 진전되어 정기적 안전점검이 필요한 실정이다. 이에 따라 농업수리시설을 보다 체계적으로 관리하고 농업용수를 보다 효율적으로 확보 운영하기 위하여 물관리 자동화 사업이 추진되어 많은 개선이 이루어졌으나 아직까지 현장업무가 관리자의 수작업에 의존하고 있으며 농촌 용수의 정확한 정보가 제때에 제공되지 못하는 등 농업수리시설에 대한 다양한 요구를 충족시키지 못하고 있다. 따라서, 농촌수자원의 효율적 관리를 위하여 농업수리시설 가운데 하나인 농수로의 수위 및 유량 정보를 자동으로 측정하며 농업수리시설물의 상태 정보를 입력하고 관리할 수 있는 모바일 App을 개발하였다. 안드로이드 OS 기반의 스마트폰을 활용하였으며 여기에는 시설물 고유정보가 포함된 QR코드 및 Active 태그를 통하여 시설물의 상태정보를 원격에 있는 서버 컴퓨터로 전송할 수 있는 원거리 무선통신 모듈이 구비되어 있다. 특히, 농업수리시설물 관리 어플리케이션은 현장관리자가 기존에 수기방식으로 시설물을 관리해 오던 것을 휴대단말 상에서 보다 효율적으로 관리를 함으로써 시설물 유지관리 업무의 효율성을 향상시키는 특징이 있다.

  • PDF

Remote System User Authentication Scheme using Smartcards (스마트카드를 이용한 원격 시스템 사용자 인증 프로토콜)

  • Jeong, Min-Kyoung;Shin, Seung-Soo;Han, Kun-Hee;Oh, Sang-Young
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.10 no.3
    • /
    • pp.572-578
    • /
    • 2009
  • Bindu et al. pointed out that Chein et al. scheme is insecure insider attack and man-in-middle attack. And then they proposed new one. In the paper, However, Bindu et al's scheme also have some problems; It is strong masquerading server/user attack and restricted reply attack. Hence we proposed improved scheme. finally, we completely had evaluated the one's security on strong masquerading server/user attack, Insider attack, Restricted attack, Stolen-verifier attack and forward secrecy. In this paper, although proposed scheme includes more operation than Bindu et al. scheme, our scheme overcomes problems of Bindu et al. scheme by the operation that is light as not to influence on modern computing technology.

Integral Design and Structural Analysis for Safety Assessment of Domestic Specialized Agrivoltaic Smart Farm System (한국형 영농형 태양광 스마트팜 시스템의 종합설계 및 구조해석을 통한 안전성 검토)

  • Lee, Sang-ik;Kim, Dong-su;Kim, Taejin;Jeong, Young-joon;Lee, Jong-hyuk;Son, Younghwan;Choi, Won
    • Journal of The Korean Society of Agricultural Engineers
    • /
    • v.64 no.4
    • /
    • pp.21-30
    • /
    • 2022
  • Renewable energy systems aim to achieve carbon neutrality and replace fossil fuels. Photovoltaic technologies are the most widely used renewable energy. However, they require a large operating area, thereby decreasing available farmland. Accordingly, agrivoltaic systems (AVSs)-innovative smart farm technologies that utilize solar energy for crop growth and electricity production-are attracting attention. Although several empirical studies on these systems have been conducted, comprehensive research on their design is lacking, and no standard model suitable for South Korea has been developed. Therefore, this study created an integral design of AVS reflecting domestic crop cultivation conditions and conducted a structural analysis for safety assessment. The shading ratio, planting distance, and agricultural machinery work of the system were determined. In addition, national construction standards were applied to evaluate their structural safety using a finite element analysis. Through this, the safety of this system was ensured, and structural considerations were put forward. It is expected that the AVS model will allow for a stable utilization of renewable energy and smart farm technologies in rural areas.

Development of Wireless ECG Clothing for Dogs with Improved Signal Detection (신호 감지성이 향상된 반려견용 무선 심전도 측정 의복 개발)

  • Kim, Soyoung;Lee, Okkyung;Kwon, Eunsun;Lee, Yejin;Min, Seungnam;Lee, Heeran
    • Journal of the Korean Society of Clothing and Textiles
    • /
    • v.46 no.5
    • /
    • pp.760-771
    • /
    • 2022
  • This study sought to develop clothing for a companion animal that can provide stable ECG measurements. A pattern for the smart clothing of a companion dog was manufactured using the replica method to select a location and method that best suited the stable measurement of ECG and improved the clothing's fitness. The smart clothing was developed as the following three types: strap type, top type, and combined top and vest type with a detachable wireless ECG monitor. The detection abilities of these were observed using the PQRST rate taken after ECG measurements while the three companion dogs were tested while resting and moving. The results revealed that apart from using an electrode, applying a gel pad is the most effective way to achieve stable ECG measurements, and the central chest region is more reliable than the left armpit for providing steady readings. The combined top and vest type showed the highest average ECG PQRST detection number, meaning that the ECG signal measurement was steady. These results may contribute to the measurement of ECG in smartwear for U-Healthcare to measure other biometric data of a companion dog.