• Title/Summary/Keyword: 안전 메시지

Search Result 670, Processing Time 0.032 seconds

A Multistage Authentication Strategy for Reliable N-to-N Communication in CGSR based Mobile Ad Hoc Networks (CGSR 기반의 이동 애드 흑 네트워크에서 신뢰성 있는 통신을 위한 노드간 인증 기법)

  • Lee Hyewon K.;Mun Youngsong
    • Journal of KIISE:Information Networking
    • /
    • v.32 no.6
    • /
    • pp.659-667
    • /
    • 2005
  • A Mobile Ad Hoc Network(MANET) is a multi hop wireless network with no prepared base stations or centralized administrations, where flocks of peer systems gather and compose a network. Each node operates as a normal end system in public networks. In addition to it, a MANET node is required to work as a router to forward traffic from a source or intermediate node to others. Each node operates as a normal end system in public networks, and further a MANET node work as a router to forward traffic from a source or intermediate node to the next node via routing path. Applications of MANET are extensively wide, such as battle field or any unwired place; however, these are exposed to critical problems related to network management, node's capability, and security because of frequent and dynamic changes in network topology, absence of centralized controls, restricted usage on network resources, and vulnerability oi mobile nodes which results from the special MANET's character, shared wireless media. These problems induce MANET to be weak from security attacks from eavesdropping to DoS. To guarantee secure authentication is the main part of security service In MANET because networks without secure authentication are exposed to exterior attacks. In this paper, a multistage authentication strategy based on CGSR is proposed to guarantee that only genuine and veritable nodes participate in communications. The proposed authentication model is composed of key manager, cluster head and common nodes. The cluster head is elected from secure nodes, and key manager is elected from cluster heads. The cluster head will verify other common nodes within its cluster range in MANET. Especially, ID of each node is used on communication, which allows digital signature and blocks non repudiation. For performance evaluation, attacks against node authentication are analyzed. Based on security parameters, strategies to resolve these attacks are drawn up.

2-Subset Difference Broadcast Encryption System Based on Secret Sharing Method (비밀분산 기반의 2-Subset Difference 브로드캐스트 암호시스템)

  • Lee, Jae Hwan;Park, Jong Hwan
    • Journal of Broadcast Engineering
    • /
    • v.20 no.4
    • /
    • pp.580-597
    • /
    • 2015
  • Broadcast encryption system is a cryptographic primitive that enables a sender to broadcast a message to a set of receivers in a secure channel. Out of previous proposed broadcast encryption systems, the most effective is the one that uses the Subset Difference(SD) method in a binary tree structure. The SD method has been realized by two underlying approaches: Pseudo-Random Generator(PRG) and Secret Sharing(SS). 2-SD method is the generalized version of the SD method by which two subsets of revoked receivers can be dealt with by one subset (in an SD-based broadcast encryption system). The primary advantage of the 2-SD method is to further reduce the size of transmission overhead, compared to the SD method. Until now, however, there is no known broadcast encryption system that is based on such a 2-SD technique using either PRG or SS basis. In this paper, we suggest a new 2-SD broadcast encryption system using the SS-based technique that was suggested by Jae Hwan Lee et al. in 2014[9]. The new system can reduce the size of ciphertext by 25% of the one in the previous SS-based broadcast encryption system. Also, on a theoretical note, ours is the first 2-SD broadcast encryption system that is provably secure.

Research on Vehicle Diagnostic and Monitoring technology Using WiBro Portable Device (와이브로 휴대기기를 사용한 차량진단 및 모니터링 기술에 관한 연구)

  • Ryoo, Hee-Soo;Won, Yong-Gwan;Park, Kwon-Chul;Ahn, Yong-Beom
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.47 no.10
    • /
    • pp.17-26
    • /
    • 2010
  • This is concerned with the technology to monitor the vehicle operation, failure and disorder by using WiBro portable device. More precisely, the technology makes it possible that the information collection device is connected to both ECU(Electronic Control Unit) which is the device for controlling engine, transmission, brake, air-bag, etc that are connected to in-vehicle network and OBD-II connector that is for data collection from various sensors. In addition, with a WiBro portable device (cell phone, PDA, PMP, UMPC, etc). equipped with a vehicle diagnostic programs, information for operation, failure and malfunction can be obtained and analyzed in real-time, and alarm is alerted when the vehicle is in abnormal status, which makes the early reactions to the status. Furthermore, the collected data can be sent through WiBro network to the server managed by the company specialized in managing the vehicles, thus the technology could help the drivers who have less knowledge about their auto-vehicles have safe and economic driving. There is always a possibility of malfunction due to various types of noise that are caused by wring-harness when the device is wired-connected. In this research, in order to overcome this problem, we propose a system configuration that can do monitoring and diagnosis with a device for collecting data from vehicle and a personal WiBro device. Also, we performed research on data acquisition and interlock for the system defined by the definition for information and data sharing platform.

Research on Communication and The Operating of Server System for Vehicle Diagnosis and Monitoring (차량진단 및 모니터링을 위한 통신과 서버시스템 운용에 관한 연구)

  • Ryoo, Hee-Soo;Won, Yong-Gwan;Park, Kwon-Chul
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.48 no.6
    • /
    • pp.41-50
    • /
    • 2011
  • This article is concerned with the technology to provide car driver the car's status which are composed of car trouble code in car engine and many sensors. In addition, it installs vehicle diagnostic programs on wireless communication's portable device, for example, Smart phone, PDA, PMP, UMPC. As a result, this is to provide car manager with many information of car sensors when we go to car maintenance. it can monitor relevant information on vehicle by portable device in real time, alert drivers with specific messages and also enable them to address abnormalities immediately. Moreover, the technology could help the drivers who perhaps don't know very well about their vehicles to drive safely and economically as well; the reason is because the whole system is composed of just Vehicle-information collecting device and personal wireless communication's portables and transfers the relating data to server computers through wireless network in order to handle information on vehicles. This technology make us monitor vehicle's running, failure and disorder by using wireless communication's portable device. Finally, this study system is composed of a lot of application to display us the car's status which get car's inner sensor information while driving a car.

Design and Implement of Secure helper using Smart-phone Auto recording App (스마트폰 자동 녹음 앱을 이용한 생활 안전 도우미 설계 및 구현)

  • Moon, Jeong-Kyung;Hwang, Deuk-Young;Kim, Jin-Mook
    • Convergence Security Journal
    • /
    • v.15 no.7
    • /
    • pp.111-118
    • /
    • 2015
  • The violent crime has increased dramatically in our society. This is because our society has to change quickly. Strong police force, but this is not enough to solve the crime. And there are a lot of police to investigate the situation difficult to go out to the crime scene. So inevitably increase in the risk of crime. Researchers have conducted a number of studies to solve this problem. However, the proposed study how realistic are many points still lacking. herefore, we to take advantage of smartphones and high-speed Internet access technology to provide security services using the push service for rapid identification and crime situation in this study. Therefore, we would like to provide rapid service to identify criminal security situation using smart-phone app and push services on the high speed internet environments. The proposed system is to record the voice information received from the smart phone near the user presses the hot key is set in advance in real-time, and stores the audio information stored in the LBS information to the server through the authentication procedure. And the server uses the stored voice data and LBS Push service information to inform their families. We have completed the design of the proposed system. And it has implemented a smart phone app, the user authentication server. And using the state in which the push service from the authentication server by transmitting a message to a user to inform a family. But more must examine whether the proposed research is relevant in future studies.

IP Camera Authentication and Key Exchange Protocol Using ID-Based Signature Scheme (ID 기반 서명 기법을 이용한 IP 카메라 인증 및 키 교환 프로토콜)

  • Park, Jin Young;Song, Chi-ho;Kim, Suk-young;Park, Ju-hyun;Park, Jong Hwan
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.28 no.4
    • /
    • pp.789-801
    • /
    • 2018
  • Currently widely used IP cameras provide the ability to control IP cameras remotely via mobile devices. To do so, the IP camera software is installed on the website specified by the camera manufacturer, and authentication is performed through the password between the IP camera and the mobile device. However, many products currently used do not provide a secure channel between the IP camera and the mobile device, so that all IDs and passwords transmitted between the two parties are exposed. To solve these problems, we propose an authentication and key exchange protocol using ID-based signature scheme. The proposed protocol is characterized in that (1) mutual authentication is performed using ID and password built in IP camera together with ID-based signature, (2) ID and password capable of specifying IP camera are not exposed, (3) provide forward-secrecy using Diffie-Hellman key exchange, and (4) provide security against external attacks as well as an honest-but-curious manufacturer with the master secret key of the ID-based signature.

The Development of XML Message for Status Tracking the Importing Agrifoods During Transport by UBL (UBL 기반 수입농수산물 운송 중 상태 모니터링을 위한 XML 메시지 개발)

  • Ahn, Kyeong Rim;Ryu, Heeyoung;Lee, Hochoon;Park, Chankwon
    • The Journal of Society for e-Business Studies
    • /
    • v.23 no.3
    • /
    • pp.159-171
    • /
    • 2018
  • The imported foods, which are imported and sold domestically, are on the rise every year, and the scale is expected to be larger, including processing the imported raw materials. However, the origin of raw materials is indicated when declaring cargo for finished products of agricultural products, but the standardization of inspection information management system for raw materials is insufficient. In addition, there is a growing concern about the presence of residual pesticides or radioactivity in raw materials or products, and customer want to know production history information when purchasing agrifoods. It manages the hazard analysis of imported agricultural products, but most of them are global issues such as microorganisms, residual pesticides, food additives, and allergy components, etc. Therefore, it is necessary to share among the logistics entities in the entire transportation process the related data. Additionally, to do this, it needs to design an architecture and standardize business model. In this paper, it defines the architecture and the work-flow that occurs between the business process for collecting, processing, and processing information for tracking the status of imported agricultural products by steps, and develops XML message with UBL and the extracted conceptual information model. It will be easy to exchange and share information among the logistics entities through the defined standard model and it will be possible to establish visibility, reliability, safety, and freshness system for transportation of agricultural products requiring real-time management.

Analysis of Al-Saggaf et al's Three-factor User Authentication Scheme for TMIS

  • Park, Mi-Og
    • Journal of the Korea Society of Computer and Information
    • /
    • v.26 no.9
    • /
    • pp.89-96
    • /
    • 2021
  • In this paper, we analyzed that the user authentication scheme for TMIS(Telecare Medicine Information System) proposed by Al-Saggaf et al. In 2019, Al-Saggaf et al. proposed authentication scheme using biometric information, Al-Saggaf et al. claimed that their authentication scheme provides high security against various attacks along with very low computational cost. However in this paper after analyzing Al-Saggaf et al's authentication scheme, the Al-Saggaf et al's one are missing random number s from the DB to calculate the identity of the user from the server, and there is a design error in the authentication scheme due to the lack of delivery method. Al-Saggaf et al also claimed that their authentication scheme were safe against a variety of attacks, but were vulnerable to password guessing attack using login request messages and smart cards, session key exposure and insider attack. An attacker could also use a password to decrypt the stored user's biometric information by encrypting the DB with a password. Exposure of biometric information is a very serious breach of the user's privacy, which could allow an attacker to succeed in the user impersonation. Furthermore, Al-Saggaf et al's authentication schemes are vulnerable to identity guessing attack, which, unlike what they claimed, do not provide significant user anonymity in TMIS.

Development and evaluation of Pre-Parenthood Education Program for high school students based on Home Economics subject (고등학생을 위한 가정교과 기반 예비부모교육 프로그램 개발 및 평가)

  • Noh, Heui-Yeon;Cho, Jae Soon;Chae, Jung Hyun
    • Journal of Korean Home Economics Education Association
    • /
    • v.29 no.4
    • /
    • pp.161-193
    • /
    • 2017
  • The purpose of this study was to develop and evaluate pre-parenthood education program(PPEP) based on Home Economics(HE) subject for high school students. The development and evaluation of PPEP based on HE subject in this study followed ADDIE model except implementation through 4 processes such as analysis, design, development, and evaluation. First, program development directions were set in three aspects such as 'general development', 'contents', and 'teaching and learning methods'. Themes of the program are 11 in total such as '1. Parenting, what is being a parent', '2. Choosing your spouse, happy marital relationship, the best gift to your children', '3. Pregnancy and birth, a moving meeting with a new life', '4. Taking care of a new born infant for 24 hours', '5. Taking care of infants, relationship with my lovely baby, attachment', '6. Taking care of young children, my child from another planet', '7. Parents and children in healthy family', '8. Parent-child relationship, wise parents to make effective interaction with their children', '9. Parents safety manager at home,', '10. Practice to take care of infants', and '11. Practice of community nurturing support service development'. In particular, learning activities of the program have major characteristics such as 1) utilization of cases including practice problems related to parenting, 2) community exchange activities utilizing learned knowledge and techniques, 3) actual life project activities utilizing learning contents related with parenting, 4) activities inducing positive changes in current life of high school students, and 5) practice activities for the necessities of life such as food, clothing and shelter supporting development of children. Second, the program was developed according to the design. Teaching-learning plans and materials for 17 classes were developed according to 11 themes. The developed plans include class flow and teacher's reference. It starts with receiving a class-related message from a virtual child at the introduction stage and ended with replying to the message by summarizing contents of the class and making a promise as a parent-to-be. That is the basic frame of class flow. Learning materials included various plans and reports necessary for learning activities and they are prepared in details so that they can be play the role of textbooks in regular curriculum. Third, evaluation of developed program was executed by a 5 point Likert scale survey on 13 HE experts on two aspects of program development process and program development results. In the evaluation of development process, mean value was 4.61 and index of content validity was 97.4%. For development results, mean value was 4.37 and index of content validity was 86.9%. These values showed that validity in the development process and results in this study was highly secured and confirmed that PPEP based on HE was appropriate and valid to enhance parent qualifications of high school learners.

Customer perception and expert assessment in restaurant food environment by region - Focused on restaurants in Suwon, Hwaseong city - (도시와 농촌의 한식 음식점 식생활 환경에 대한 고객 인식 및 전문가 평가 비교 - 수원, 화성지역 음식점을 중심으로 -)

  • Oh, Mi Hyun;Choe, Jeong-Sook;Kim, Young;Lee, Sang Eun;Paik, Hee Young;Jang, Mi Jin
    • Journal of Nutrition and Health
    • /
    • v.47 no.6
    • /
    • pp.463-474
    • /
    • 2014
  • Purpose: The aim of this study was to assess the food environment, particularly focusing on restaurants in three areas (Suwon city, Hwaseong Byeongieom-dong, and Bibong-myun). Methods: A total of 662 persons were surveyed on customers' perceptions of the food environment in restaurants. A structured questionnaire composed of 30 questions on 7 factors, sanitation (4 items), displaying information (5), food quality (12), information on nutritional and healthy food choice (6), restaurant's accessibility (1), availability (1), and affordability (1) was used. In addition, an expert assessment of restaurant sanitation, and information on nutritional healthy food choice was conducted through visiting 126 restaurants. Results: Scores (range of score : 1~7) for each factors assessing the restaurant food environment were 5.06 for sanitation factors, 5.05 for displaying information factors, 5.13 for taste appearance factors, and 4.35 for healthy menu factors. Informations on nutritional healthy food choice showed a low rate: only 16.24% of the subjects answered that there is a message encouraging choice of healthy foods and 27.4% answered that menus contain nutritional information. Significant differences in food environment were observed by region (city, town, rural). The restaurants food environment in the rural area turned out to be poorer than that of the other two areas. In comparison of customer perception and expert assessment, significant differences were observed for 'Employee appearances and uniforms are clean and tidy' (p < .05), and 'There is a message encouraging the choice of healthy foods' (p < .05). Conclusion: This study provided evidence for differences of restaurant food environment by regions. In the rural area, there is a problem in restaurant's accessibility, availability, and affordability because of a lack of variety in menu items and restaurants. This results suggest that there is a need for more healthy food restaurants in the rural area.