• Title/Summary/Keyword: 원격 인증

Search Result 287, Processing Time 0.027 seconds

Design of Embedded Security Controller Based on Client Authentication Utilizing User Movement Information (사용자의 이동정보를 활용한 클라이언트 인증 기반의 임베디드 보안 컨트롤러 설계)

  • Hong, Suk-Won
    • Journal of Digital Convergence
    • /
    • v.18 no.3
    • /
    • pp.163-169
    • /
    • 2020
  • A smart key has been used in a variety of embedded environments and there also have been attacks from a remote place by amplifying signals at a location of a user. Existing studies on defence techniques suggest multiple sensors and hash functions to improve authentication speed; these, however, increase the electricity usage and the probability of type 1 error. For these reasons, I suggest an embedded security controller based on client authentication and user movement information improving the authentication method between a controller and a host device. I applied encryption algorithm to the suggested model for communication using an Arduino board, GPS, and Bluetooth and performed authentication through path analysis utilizing user movement information for the authentication. I found that the change in usability was nonsignificant when performing actions using the suggested model by evaluating the time to encode and decode. The embedded security controller in the model can be applied to the system of a remote controller for a two-wheeled vehicle or a mobile and stationary host device; in the process of studying, I found that encryption and decryption could take less then 100ms. The later study may deal with protocols to speed up the data communication including encryption and decryption and the path data management.

Development of Authentication and Authorization System based on User Location for an Administration Equipment (사용자 위치 기반의 관리장비 인증 및 권한부여 시스템 개발)

  • Hong, Sung-Min;Kim, Eun-Gyeong;Kim, Seok-Hoon
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2017.04a
    • /
    • pp.129-131
    • /
    • 2017
  • 최근 다양한 사물인터넷 장비들의 개발 및 도입이 확산됨에 따라, 도입된 장비들에 대한 관리의 중요성이 나날이 부각되고 있다. 현재 이러한 사물인터넷 환경을 구성하고 있는 다수의 장비들을 효과적으로 관리할 수 있는 다양한 관리장비들이 출시되어 있지만, 이 중 가장 범용적으로 사용되고 있는 장비는 스마트폰이다. 스마트폰은 언제 어디서나 사용할 수 있다는 장점이 있지만, 관리되는 장비의 특성에 따라 스마트폰으로 원격지에서 특정 장비를 관리하게 될 경우 보안 및 장비상태의 정확한 확인 등의 측면에서 많은 위험성을 내포하게 된다. 때문에, 본 논문에서는 스마트폰을 이용하되 특정 위치 또는 범위를 벗어나는 경우에는 사용자가 관리장비에 접근할 수 없도록 하여, 잠재적인 위험성을 미연에 방지할 수 있는 시스템을 제안한다. 이러한 문제점들을 해결하기 위해, 본 논문에서 제안하는 시스템은 안드로이드 디바이스에서 사용가능한 센서 기술들을 활용하여, 특정 지역 및 범위 내에서만 관리장비에 접근할 수 있도록 하는 솔루션을 내재하고 있으며, 이를 실제로 모바일 기반 승강기 보수작업용 컴퓨터의 인증 및 권한부여 시스템에 적용하여, 제안 시스템의 우수성을 검증하였다.

Security Policy Framework for Home Network (홈 네트워크 보안 정책 프레임워크)

  • Kim, Geon-Woo;Kim, Do-Woo;Lee, Jun-Ho;Han, Jong-Wook
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • v.9 no.1
    • /
    • pp.839-842
    • /
    • 2005
  • As various mobile technologies, sensor technologies, and remote control technologies are growing and quality of life is enhanced, researches and developments on home network are actively on going. Currently, some network service providers and construction corporations are going to provide home network service, but neither secure nor efficient, So, in this paper, we propose a security framework for providing various secure user authentication mechanisms and efficiently controlling services in home network. Namely, we are going to provide active home network security services with home gateway-based security policy, which locates on the gateway of each home.

  • PDF

Design and Development Study of a Trust-based Decentralized User Authentication System with Enhanced Data Preprocessing Functionality in a Metaverse Environment (메타버스 환경에서 Data Preprocessing 기능을 개선한 Trust-based Decentralized User Authentication 시스템 설계 및 개발 연구)

  • Suwan Park;Sangmin Lee;Kyoungjin Kim
    • Convergence Security Journal
    • /
    • v.23 no.4
    • /
    • pp.3-15
    • /
    • 2023
  • As remote services and remote work become commonplace, the use of the Metaverse has grown. This allows transactions like real estate and finance in virtual Second Life. However, conducting economic activities in the Metaverse presents unique security challenges compared to the physical world and conventional cyberspace. To address these, the paper proposes solutions centered on authentication and privacy. It suggests improving data preprocessing based on Metaverse data's uniqueness and introduces a new authentication service using NFTs while adhering to W3C's DID framework. The system is implemented using Hyperledger Indy blockchain, and its success is confirmed through implementation analysis.

Analysis on Security Vulnerabilities of a Biometric-based User Authentication Scheme for Wireless Sensor Networks (무선 센서 네트워크를 위한 생체 정보 기반 사용자 인증 스킴의 보안 취약점 분석)

  • Joo, Young-Do
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.14 no.1
    • /
    • pp.147-153
    • /
    • 2014
  • The numerous improved schemes of remote user authentication based on password have been proposed in order to overcome the security weakness in user authentication process. Recently, some of biometric-based user authentication schemes to use personal biometric information have been introduced and they have shown the relatively higher security and the enhanced convenience as compared to traditional password-based schemes. These days wireless sensor network is a fundamental technology in face of the ubiquitous era. The wireless sensor networks to collect and process the data from sensor nodes in increasing high-tech applications require important security issues to prevent the data access from the unauthorized person. Accordingly, the research to apply to the user authentication to the wireless sensor networks has been under the progress. In 2010, Yuan et al. proposed a biometric-based user authentication scheme to be applicable for wireless sensor networks. Yuan et al. claimed that their scheme is effectively secure against the various security flaws including the stolen verifier attack. In this paper, author will prove that Yuan et al.'s scheme is still vulnerable to the password guessing attack, user impersonation attack and the replay attack, by analyzing their security weakness.

Study on development of the remote control door lock system including speeker verification function in real time (화자 인증 기능이 포함된 실시간 원격 도어락 제어 시스템 개발에 관한 연구)

  • Kwon, Soon-Ryang
    • Journal of the Korean Institute of Intelligent Systems
    • /
    • v.15 no.6
    • /
    • pp.714-719
    • /
    • 2005
  • The paper attempts to design and implement the system which can remotely check visitors' speech or Image by a mobile phone. This system is designed to recognize who a visitor is through the automatic calling service, not through a short message, via the mobile phone, even when the home owner is outside. In general, door locks are controlled through the home Server, but it is more effective to control door locks by using DTMF signal from a real-time point of view. The technology suggested in this paper makes it possible to communicate between the visiter and the home owner by making a phone call to tile home owner's mobile phone automatically when the visiter visits the house even if the home owner is outside, and if necessary, it allows for the home owner to control the door lock remotely. Thanks to the system, the home owner is not restricted by time or space for checking the visitor's identification and controlling the door lock. In addition, the security system is improved by changing from the existing password form to the combination of password and speaker verification lot the verification procedure required for controlling the door lock and setting the environment under consideration of any disadvantages which may occur when the mobile Phone is lost. Also, any existing problems such as reconnection to tile network for controlling tile door lock are solved by controlling the door lock in real time by use of DTMF signal while on the phone.

Implementation of Virtual Laboratory Based on the Internet (인터넷 기반 가상실험실의 구현)

  • Joo, Young-Hoon;Kim, Moon-Hwan;Lee, Ho-Jae;Park, Jin-Bae
    • Journal of the Korean Institute of Intelligent Systems
    • /
    • v.13 no.4
    • /
    • pp.448-454
    • /
    • 2003
  • This paper concerns the establishment of the Internet-based virtual laboratory (VL). In control engineering, it is required to evaluate the feasibility of a newly developed controller design technique by applying to a physical system. However, it is inefficient to make or build such a experimental apparatus in all research activities. A possible remedy is to share such a apparatus spatially via the Internet. We set up techniques for the remote -control of various experimental apparatuses based on the Internet. The proposed VL forms a server-client structure and is implemented in multi-control interfaces.

Design of User Certification Module of Home Gateway System based on OSGi (OSGi 기반 홈게이트웨이 시스템의 사용자 인증 모듈 설계)

  • Myung, Sun-Kyu;Kim, Gwang-Hyun
    • Convergence Security Journal
    • /
    • v.10 no.2
    • /
    • pp.27-35
    • /
    • 2010
  • We implemented an application system which is able to verify visitor identification for remote bundle control based on OSGi and web camera control using embedded linux system. This system are designed open Oscar framework by porting java on the embedded linux system and implemented web camera system in local area networks. Also This system can verify information of visitor from receiving the data of RFID reader and designed the wireless internet system in home. Basically, in this paper we expect that home network system development and the period of application service development are reduced with integrated service provision based on OSGi.

Software Platform Design and Implementation for Interworking between Smart TV, PC and Smart Phone (스마트 TV, PC, 스마트 폰 간의 상호 연동을 위한 소프트웨어 플랫폼 설계 및 구현)

  • Kim, Min-Jae;Min, Sang-Won
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.37B no.9
    • /
    • pp.831-836
    • /
    • 2012
  • To provide convenient life, we consider the situation of using the smart phone to control smart TV and PC in home and office. In this paper, we design the interworking platform between smart TV, smart phone and PC, and implement their applications. Our smart phone application controls the smart TV and PC, where our smart TV application communicates with the smart phone and PC can be booted by the login and password information given form our smart phone application. We hope that our platform design and application implementation will be contributed to be a foundation of interworking between various smart devices in the near-future real smart life.

Multi-Certification of Agent System Using XML (XML 전자서명을 이용한 다중인증 멀티 에이전트시스템)

  • J. Kim, Kui-Nam
    • Convergence Security Journal
    • /
    • v.5 no.1
    • /
    • pp.29-34
    • /
    • 2005
  • Internet becomes absolutely necessary tools due to rapid progress of information technology. Educational correspondence about an age of information demand is focused on a learner and remote education based on information technology WBI(Web Based Instruction) is a formation that remotly educate a learner using web, possible mutual reaction between instructor and learner, submit various studying material, has a good point to overcome spatial restriction. Internal and external standardization working is accelerated and recently XML security studies are activated using XML which is next generation web standard document format. In this paper, we propose multi-Certification of agent system using XML digital signature to satisfy security requirement.

  • PDF