• Title/Summary/Keyword: 식별 및 인증

Search Result 194, Processing Time 0.023 seconds

A Study of Service Middleware for Application Based on USN/RFID/GPS (USN/RFID/GPS 응용을 위한 서비스 미들웨어 연구)

  • Moon, Kyeung-Bo;Lee, Chang-Young;Kim, Do-Hyeon
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.9 no.5
    • /
    • pp.1284-1288
    • /
    • 2008
  • Recently, there is increasing the development requirement of middleware and interface for GPS(Global Positioning System), RFID(Radio Frequency IDentification), sensor networks. GPS supports a useful location based service. RFID supports products logistic and distribution services through the identification. A sensor network collects a context information, such as humidity, temperature and atmospheric pressure. This paper implements and verifies a integrated service middleware for supporting efficiently process of sensing data collected from RFID, GPS and sensor network. This middleware have the temporary store function, the redundancy exclusion function, certification function, the classification function and the database storage function. Additionary, this middleware connects with low-level adaptor using socket interface and supports the high-level application services using database connection. Therefore, user can develop easily various many ubiquitous application system using proposed middleware instead of each RFID middleware, GPS middleware and, middleware based on sensor network.

A Study on Design of the Curation System of Instructional Materials for Reusing and Sharing (재사용과 공유를 위한 수업 자료 큐레이션 시스템 기능에 대한 연구)

  • Park, Yang-Ha;Moon, Sung-Been
    • Journal of the Korean Society for Library and Information Science
    • /
    • v.49 no.2
    • /
    • pp.135-168
    • /
    • 2015
  • This study intends to design a curation system to support elementary and secondary schools for reusing and sharing instructional materials efficiently. It is proved through interviewing teachers at the chalkface that they utilize instructional materials, and there are some differences between elementary schools and secondary schools about the media for creating the instructional materials, and the purpose of using them. The functional requirements of curation system for reusing and sharing instructional materials are derived from questionnaires. The investigation of the existing curation systems was conducted to identify the strategies for policy, design, standard, and tools for effective operation of the digital curation system. The tasks and the functions of the curation system designed by reflecting the results of this study are as following. The tasks related to individual workspace include 'authentication', 'system configuration', 'registration' of created materials, 'material keeping' for the individual, and 'reusing (editing)'. The tasks related to sharing workspace contain 'receiving' for sharing, 'archiving' for accessing, 'peer evaluation', 'accessing' through the retrieval, and 'bulletin board'.

The Watermarking Method Using by Binary Image (이진영상을 이용한 워터마킹 기법)

  • Lim Hyun-Jin;Lee Seung-Kyu;Kim Tea-Ho;Park Mu-Hun
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2006.05a
    • /
    • pp.163-166
    • /
    • 2006
  • The field of medical images has been digitalized as the development of computer and the digitalization of the medical instruments. As a result it causes a lot of problems such as an illegal copy related to medical images and property right of the medical images. Therefore, digital watermarking is used for discrimination whether the data are modified or not. It is also used to protect both the property right of medical images and the private life of many patients. The proposed theories, the Non-blind and the Blind method, have two problems. One is needed an original image and the other is using a gaussian watermarking. This paper proposes the new Blind Watermarking using binary images in order to easily recognize the results of watermark. This algorithm is described that an watermark of a binary image is wavelet-transformed, and then a transformed watermark is inserted in medium-band of frequency domains of original image by the Circular Input method. The propose method presented the good performance of over 0.97 in NC.

  • PDF

Security Threats Analysis and Security Requirement for Industrial Wireless Protocols : ISA 100.11a and WirelessHART (ISA 100.11a 및 WirelessHART 기반 보안위협 식별 및 보안요구사항 도출 연구)

  • Jeong, Jae-Han;Kwon, Sung-Moon;Shon, Tae-Shik
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.29 no.5
    • /
    • pp.1063-1075
    • /
    • 2019
  • In recent years, industrial automation has been established and WISN (Wireless Industrial Sensor Network) has been introduced for efficient system management. By introducing WISN, many engineering costs have been reduced and process processors have been optimized. And communication flow using wireless is increasing. An empirical study on industrial wireless sensor networks is actively conducted, but there are few security studies on them and they are exposed to such threats. If there is a problem with the standard of the wireless communication protocol itself, the device that is certified according to the standard may also be subject to security threats including problems. We analyze security functions and threats of ISA 100.11a and WirelessHART protocol stack based on standards. Procedures for distributing the security key are not provided or it is vulnerable using the Global Data Link key when the device enters the network. This paper presents the problems of the standard itself and presents the security requirements accordingly.

Research Trend Analysis of Risk Cost Model for UAM Flight Path Planning (UAM 비행 경로 계획을 위한 위험 비용 모델 연구 동향 분석)

  • Jae-Hyeon Kim;Dong-Min Lee;Myeong-Jin Lee;Yeong-Hoon Choi;Ji-Hun Kwon;Jong-Whoa Na
    • Journal of Advanced Navigation Technology
    • /
    • v.28 no.1
    • /
    • pp.68-76
    • /
    • 2024
  • With the recent rapid growth of the domestic and international unmanned aerial vehicle (UAV) market and the increasing importance of UAV operations in urban centers, such as UAMs, the safety management and regulatory framework for human life and property damage caused by UAV failures has been emphasized. In this study, we conducted a comparative analysis of risk-cost models that evaluate the risk of an operating area for safe UAM flight path planning, and identified the main limitations of each model to derive considerations for future model development. By providing a basic model for improving the safety of UAM operations, this study is expected to make an important contribution to technical improvements and policy decisions in the field of UAM flight path planning.

A Study on State Estimation Based Intrusion Detection in Power Control Systems Using DNP3 over TCP/IP (DNP3 over TCP/IP 환경 전력 제어시스템에서의 상태추정 기반 침입 탐지 연구)

  • Hyeonho Choi;Junghee Lee
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.34 no.4
    • /
    • pp.615-627
    • /
    • 2024
  • With the evolution of power systems and advancements in IT technology, there is an increasing demand to shift from serial-based communication to TCP/IP-based communication. However, TCP/IP communication entails various security threats, necessitating extensive consideration from an information security perspective. Security measures such as authentication and encryption cannot be rapidly implemented due to issues like the replacement of Remote Terminal Units (RTUs) and the performance requirements of encryption algorithms. This paper proposes a state estimation-based intrusion detection model to identify and effectively detect threats to power control systems in such a context. The proposed model, in addition to signature detection methods, verifies the validity of acquired data, enabling it to detect attacks that are difficult to identify using traditional methods, such as data tampering.

Design and Implementation of u-Healthcare System for u-Wellness (u-웰니스를 위한 u-헬스케어 시스템의 설계와 구현)

  • Seo, Hyunsoo;Ryu, Dae-Hyun;Choi, Taewan
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.13 no.11
    • /
    • pp.5506-5511
    • /
    • 2012
  • u-Wellness is widely applicable to individuals and medical service providers such as hospitals and it includes u-fitness and video health counselling services at the side of the provider and stress management, obesity management, and the amount of exercise at the side of the individual. In this paper, we design and implement a smart health care system which uses the authentication device to identify an individual and the user's smart phone. Our system records and manages the amount of exercise on the basis of the prescription of health care professionals through the exercise equipment and Wi-Fi communication. Therefore, our system helps user do optimized amount of exercise through the health care professional's prescription. And our system quantifies the results of the measurement of body fat measuring machines and experts to build the database and automatically schedule.

Design and evaluation of a dissimilarity-based anomaly detection method for mobile wireless networks (이동 무선망을 위한 비유사도 기반 비정상 행위 탐지 방법의 설계 및 평가)

  • Lee, Hwa-Ju;Bae, Ihn-Han
    • Journal of the Korean Data and Information Science Society
    • /
    • v.20 no.2
    • /
    • pp.387-399
    • /
    • 2009
  • Mobile wireless networks continue to be plagued by theft of identify and intrusion. Both problems can be addressed in two different ways, either by misuse detection or anomaly-based detection. In this paper, we propose a dissimilarity-based anomaly detection method which can effectively identify abnormal behavior such as mobility patterns of mobile wireless networks. In the proposed algorithm, a normal profile is constructed from normal mobility patterns of mobile nodes in mobile wireless networks. From the constructed normal profile, a dissimilarity is computed by a weighted dissimilarity measure. If the value of the weighted dissimilarity measure is greater than the dissimilarity threshold that is a system parameter, an alert message is occurred. The performance of the proposed method is evaluated through a simulation. From the result of the simulation, we know that the proposed method is superior to the performance of other anomaly detection methods using dissimilarity measures.

  • PDF

Constructing an Open Source Based Software System for Reusable Module Extraction (재사용 모듈 추출을 위한 오픈 소스 기반 소프트웨어 시스템 구축)

  • Byun, Eun Young;Park, Bokyung;Jang, Woosung;Kim, R. Young Chul;Son, Hyun Seung
    • KIISE Transactions on Computing Practices
    • /
    • v.23 no.9
    • /
    • pp.535-541
    • /
    • 2017
  • Today, the scale of the computer software market has increased, and massive sized software has been developed to satisfy diverse requirements. In this context, software complexity is increasing and the quality of software is becoming more difficult to manage. In particular, software reuse is important for the improvement of the environments of legacy systems and new system development. In this paper, we propose a method to reuse modules that are certified by quality. Reusable levels are divided into code area (method, class, and component), project domain, and business levels. Based on the coupling and cohesion of software complexity, we propose a reusable module extraction mechanism with reusability metrics, which constructs a visualization of the "reusable module's chunk" based on the method and class levels. By applying reverse engineering to legacy projects, it is possible to identify reusable modules/objects/chunks. If these modules/objects/chunks are to be reused to develop an extension system or similar new system, we need to ensure software reliability in order to reduce the time and cost of software development.

Design of Image Tracking System Using Location Determination Technology (위치 측위 기술을 이용한 영상 추적 시스템 설계)

  • Kim, Bong-Hyun
    • Journal of Digital Convergence
    • /
    • v.14 no.11
    • /
    • pp.143-148
    • /
    • 2016
  • There is increasing concern about security as a need for increased safety in the information industry society. However, it does not meet the needs for safety including CCTV. Therefore, in this paper, we link the processing technology using the image information to the IPS system consisting of GPS and Beacon. It designed a conventional RFID tag attached discomfort and image tracking system is limited to complement the disadvantages identifiable area. To this end, we designed a smart device and the Internet of Things convergence system and a research to ensure the accuracy and reliability of the IPS of the access control system. Finally, by leveraging intelligent video information using a PTZ camera, and set the entrant management policies it was carried out to control the situation and control. Also, by designing the integrated video tracking system, an authentication server, visualization systems were designed to establish an efficient technique for analyzing the IPS entrant behavior patterns.