• Title/Summary/Keyword: 위치 프라이버시

Search Result 185, Processing Time 0.022 seconds

Source-Location Privacy in Wireless Sensor Networks (무선 센서 네트워크에서의 소스 위치 프라이버시)

  • Lee, Song-Woo;Park, Young-Hoon;Son, Ju-Hyung;Kang, Yu;Choe, Jin-Gi;Moon, Ho-Gun;Seo, Seung-Woo
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.17 no.2
    • /
    • pp.125-137
    • /
    • 2007
  • This paper proposes a new scheme to provide the location privacy of sources in Wireless Sensor Networks (WSNs). Because the geographical location of a source sensor reveals contextual information on an 'event' in WSN, anonymizing the source location is an important issue. Despite abundant research efforts, however, about data confidentiality and authentication in WSN, privacy issues have not been researched well so far. Moreover, many schemes providing the anonymity of communication parties in Internet and Ad-hoc networks are not appropriate for WSN environments where sensors are very resource limited and messages are forwarded in a hop-by-hop manner through wireless channel. In this paper, we first categorize the type of eavesdroppers for WSN as Global Eavesdropper and Compromising Eavesdropper. Then we propose a novel scheme which provides the anonymity of a source according to the types of eavesdroppers. Furthermore, we analyze the degree of anonymity of WSN using the entropy-based modeling method. As a result, we show that the proposed scheme improves the degree of anonymity compared to a method without any provision of anonymity and also show that the transmission range plays a key role to hide the location of source sensors.

A Study on the Effect of Consumer Characteristics on Intention to Use in Mobile Location-Based Advertising (모바일 위치기반 광고에서 소비자 특성이 이용의도에 미치는 영향에 관한 연구)

  • Cho, Won-Sang;Han, Dong-Gyun;Whang, Jae-Hoon
    • Informatization Policy
    • /
    • v.29 no.1
    • /
    • pp.38-59
    • /
    • 2022
  • The development of IT technology and the spread of smartphones are having a great impact on businesses and consumers. Consumers have been able to acquire more diverse and larger amounts of information than in the past due to information provided through smartphones and information search on the internet, which has a significant influence on decision-making. Companies have also become sensitive to such changes in consumer behavior patterns, reflected in their marketing. In addition, among the various characteristics of smartphones, location-based technology has become an important factor in providing targeted marketing from a company's point of view. Such technological development and social change have led to the expansion of the mobile advertising market, which promotes products or services based on the location of consumers and provides benefits such as discount coupons. In this study, we have analyzed the influence of consumer characteristics on intention to use in mobile location-based advertising, which has become an important marketing method in the mobile advertising market. The effects of variables of personalization, engagement, coupon proneness, economic efficiency, and irritation on attitude and information privacy concerns were analyzed, and the effects of attitude and information privacy concerns on intention to use were analyzed. The results of this study are deemed to be able to suggest factors to consider when providing mobile location-based advertising to consumers in the future.

Self Re-Encryption Protocol (SREP) providing Strong Privacy for Low-Cost RFID System (저가형 RFID 시스템에 강한 프라이버시를 제공하는 자체 재암호화 프로토콜)

  • Park Jeong-Su;Choi Eun-Young;Lee Su-Mi;Lee Dong-Hoon
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.16 no.4
    • /
    • pp.3-12
    • /
    • 2006
  • RFID (Radio Frequency Identification) system is expected to play a critical role providing widespread services in the ubiquitous period. However, widespread use of RFID tags may create new threats to the privacy of individuals such as information leakage and traceability. It is difficult to solve the privacy problems because a tag has the limited computing power that is not the adequate resource to support the general encryption. Although the scheme of [2] protects the consumer privacy using an external agent, a tag should compute exponential operation needed high cost. We propose Self Re-Encryption Protocol (SREP) which provides song privacy without assisting of any external agent. Our SREP is well suitable to low-cost RFID system since it only needs multiplication and exclusive-or operation.

Tag Identification Time Reduction Scheme of Back-End Server for Secure RFID Privacy Protection Protocol (안전한 RFID 프라이버시 보호 프로토콜을 위한 백엔드 서버의 태그 판별 시간 절감 기법)

  • Yeo Sang-Soo;Kim Soon-Seok;Kim Sung-Kwon
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.16 no.4
    • /
    • pp.13-26
    • /
    • 2006
  • RFID technology is evaluated as one of core technologies for ubiquitous environment, because of its various characteristics which barcode systems don't have. However, RFID systems have consumer's privacy infringement problems, such like information leakage and location tracing. We need RFID privacy protection protocols, that satisfy three essential security requirements; confidentiality, indistinguishability and forward security, in order to protect consumer's privacy perfectly. The most secure protocol, that satisfies all of the three essential security requirements, among existing protocols, is the hash-chain based protocol that Ohkubo proposed. Unfortunately this protocol has a big disadvantage that it takes very long time to identify a tag in the back-end server. In this paper, we propose a scheme to keep security just as it is and to reduce computation time for identifying a tag in back-end server. The proposed scheme shows the results that the identification time in back-end server is reduced considerably compared to the original scheme of Ohkubo protocol.

A Mutual Expose Prevention Scheme of Node Location in USNs (USNs 에서 노드 위치정보 보호기법)

  • Lim Hwa-Jung;Lee Heon-Guil
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2006.05a
    • /
    • pp.963-966
    • /
    • 2006
  • 유비쿼터스 센서 네트워크(Ubiquitous Sensor Networks: USNs)환경은 주변 공간의 상황을 인식할 수 있고, 인식한 상황을 바탕으로 적절한 시기에 필요한 정보를 올바른 사용자나 사용자 장치에게 제공해주는 지능적인 환경을 제공한다. 이러한 환경에서 사용자의 위치정보는 매우 중요한 요소로 부각되고 있으며, 위치정보 측정을 위해 GPS(Global Positioning System)같은 위치 측정 시스템들이 개발되고 있다. 하지만, 사용자의 위치정보를 측정하는 것은 다른 한편으로 사용자의 프라이버시를 침해 할 수도 있는 심각한 보안상의 문제점을 야기시킬 수 있다. 본 논문에서는 CBS(Covert Base Station)을 이용하여 베이스스테이션만이 노드의 위치를 파악할 수 있도록 하여, 노드 및 노드 주변의 다른 어떤 노드에게도 위치가 노출되지 않도록 하기 위한 기법을 제시한다.

  • PDF

Mix-Zone Technique using Dummy to Protect Privacy (위치기반 서비스에서의 프라이버시 보호를 위한 Dummy Mix-zone 기법)

  • Jung, Kang-Soo;Park, Seog
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2011.06a
    • /
    • pp.93-96
    • /
    • 2011
  • 본 논문은 위치기반 서비스에서 사용자의 개인 정보 노출을 방지하기 위해 사용되었던 주요 기법들을 정리하고 이 중 가장 일반적으로 사용되는 Mix-zone 기법의 한계를 분석하였다. 제안 기법은 더미를 사용하여 Mix-zone 기법의 한계를 보완하였으며 동시에 더미 사용시 발생할 수 있는 더미 노출 문제를 해결하였다. 또한 주요 도심지를 대상으로 한 실험을 통해 해당 기법을 검증함으로써 제안 기법이 실제 환경에서 적용 가능함을 보였다.

A Study of LBS Security Model in the Application Service using W-PKI (W-PKI를 이용한 LBS 응용서비스에서의 보안 모델 연구)

  • 이진우;황지온;김관연;박세현
    • Proceedings of the Korea Institutes of Information Security and Cryptology Conference
    • /
    • 2003.07a
    • /
    • pp.245-248
    • /
    • 2003
  • LBS는 이동통신망이나 위성신호등을 이용하여 Mobile 단말의 위치를 측정하고, 측정한 위치와 관련된 다양한 정보 서비스를 제공하기 위한 기술이다. 그러나 사용자의 프라이버시(Privacy) 문제나 접근제어(Access Control)같은 인증(Authentication)문제가 중요한 이슈로 대두되고 있다. 본 논문에서는 LBS에 대한 전반적인 사항을 분석하여 문제점을 도출하고, LBS Privacy 문제점을 보호할 수 있는 방안을 제시한다. 최종적으로 제안된 모델은 차세대 LBS 시스템의 개인정보 및 Privacy 보호를 위한 기술적인 대안을 제시하였으며, 차세대 이동통신의 기반 기술이 될 것으로 기대한다.

  • PDF

Threshold Cryptography Scheme for Mutual Exposed Key in USNs (USNs에서 키 노출 방지를 위한 쓰레시홀드 암호화 기법)

  • Lim Hwa-Jung;Lee Heon-Guil
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2006.06c
    • /
    • pp.310-312
    • /
    • 2006
  • 유비쿼터스 센서 네트워크(Ubiquitous Sensor Networks: USNs)환경은 주변 공간의 상황을 인식할 수 있고, 인식한 상황을 바탕으로 적절한 시기에 필요한 정보를 올바른 사용자나 사용자 장치에게 제공해주는 지능적인 환경을 제공한다. 이러한 환경에서 사용자의 위치정보는 매우 중요한 요소로 부각되고 있고 위치측정기술도 개발되고 있다. 하지만, 사용자의 위치정보를 측정하는 것은 다른 한편으로 사용자의 프라이버시를 침해 할 수도 있는 심각한 보안상의 문제점을 야기시킬 수 있다. 본 논문에서는 CBS(Covert Base Station)을 이용하여 베이스스테이션만이 노드의 위치를 파악할 수 있도록 하고, 위치를 파악하는 동안 노드 및 노드 주변의 다른 어떤 노드에게도 위치가 노출되지 않도록 하기 위한 (n, t+1) 쓰레시홀드 암호화 기법을 제시한다.

  • PDF

RFID Mutual Authentication Protocol Against Reflection Attack (반사공격에 안전한 RFID 인증 프로토콜)

  • Kim, Bae-Hyun;Ryoo, In-Tae
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.32 no.3C
    • /
    • pp.348-354
    • /
    • 2007
  • RFID system is emerging new technology for ubiquitous computing environment. RFID system, however, provides privacy problems while the technology offers incredible rich opportunities for applications in the filed of logistics, distribution, and medical services, etc. Many researches have been conducted in order to solve this problem, but the current RFID authentication protocols are still insufficient for settling the privacy problem in the point of view of privacy intrusion and system efficiency. The purpose of this paper is to present a RFID mutual authentication protocol which improves safety level, compared with current authentication protocols. The proposed authentication protocol can provide mutual authentication services, and is secure against location tracing, spoofing, reflection attack.