• Title/Summary/Keyword: 초연결

Search Result 193, Processing Time 0.024 seconds

A Study on the Establishment of Entropy Source Model Using Quantum Characteristic-Based Chips (양자 특성 기반 칩을 활용한 엔트로피 소스 모델 수립 방법에 관한 연구)

  • Kim, Dae-Hyung;Kim, Jubin;Ji, Dong-Hwa
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2021.10a
    • /
    • pp.140-142
    • /
    • 2021
  • Mobile communication technology after 5th generation requires high speed, hyper-connection, and low latency communication. In order to meet technical requirements for secure hyper-connectivity, low-spec IoT devices that are considered the end of IoT services must also be able to provide the same level of security as high-spec servers. For the purpose of performing these security functions, it is required for cryptographic keys to have the necessary degree of stability in cryptographic algorithms. Cryptographic keys are usually generated from cryptographic random number generators. At this time, good noise sources are needed to generate random numbers, and hardware random number generators such as TRNG are used because it is difficult for the low-spec device environment to obtain sufficient noise sources. In this paper we used the chip which is based on quantum characteristics where the decay of radioactive isotopes is unpredictable, and we presented a variety of methods (TRNG) obtaining an entropy source in the form of binary-bit series. In addition, we conducted the NIST SP 800-90B test for the entropy of output values generated by each TRNG to compare the amount of entropy with each method.

  • PDF

Deep Learning-based Gait Authentication System (딥러닝 기반 걸음걸이 인증 시스템)

  • Choi, Ji-Woo;Choi, Sangil;Kang, Taewon
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2022.11a
    • /
    • pp.459-461
    • /
    • 2022
  • 개인 정보 보호가 중요시되는 초연결사회에서는 정보와 사용자를 연결하는 매개체는 적법하지 않은 사용자를 판별할 수 있어야 한다. 본 연구는 그 매개체를 스마트폰으로 삼고 인간의 걸음걸이에 기반한 스마트폰 인증 시스템을 제안한다. 인간의 걸음걸이를 딥러닝 모델 중 하나인 CNN으로 학습시킨 후, 스마트폰에 탑재하여 사용자가 스마트폰을 휴대한 상태로 7초간 걸음으로써 적법한 사용자인지 아닌지의 여부를 판별한다. 본 연구에서 제안한 모델의 평가 지표로는 정확도, 정밀도, 재현율, F1-score를 사용했으며, 그 결과, 위 4개의 평가지표 모두 평균 95% 이상의 결과를 얻었다.

Automated Cyber Threat Emulation Based on ATT&CK for Cyber Security Training

  • Kim, Donghwa;Kim, Yonghyun;Ahn, Myung-Kil;Lee, Heejo
    • Journal of the Korea Society of Computer and Information
    • /
    • v.25 no.9
    • /
    • pp.71-80
    • /
    • 2020
  • As societies become hyperconnected, we need more cyber security experts. To this end, in this paper, based on the analysis results of the real world cyber attacks and the MITRE ATT&CK framework, we developed CyTEA that can model cyber threats and generate simulated cyber threats in a cyber security training system. In order to confirm whether the simulated cyber threat has the effectiveness of the actual cyber threat level, the simulation level was examined based on procedural, environmental, and consequential similarities. in addition, it was confirmed that the actual defense training using cyber simulation threats is the same as the expected defense training when using real cyber threats in the cyber security training system.

Analysis of Artificial Intelligence's Technology Innovation and Diffusion Pattern: Focusing on USPTO Patent Data (인공지능의 기술 혁신 및 확산 패턴 분석: USPTO 특허 데이터를 중심으로)

  • Baek, Seoin;Lee, Hyunjin;Kim, Heetae
    • The Journal of the Korea Contents Association
    • /
    • v.20 no.4
    • /
    • pp.86-98
    • /
    • 2020
  • The artificial intelligence (AI) is a technology that will lead the future connective and intelligent era by combining with almost all industries in manufacturing and service industry. Although Korea is one of the world's leading artificial intelligence group with the United States, Japan, and Germany, but its competitiveness in terms of artificial intelligence patent is relatively low compared to others. Therefore, it is necessary to carry out quantitative analysis of artificial intelligence patents in various aspects in order to examine national competitiveness, major industries and future development directions in artificial intelligence technology. In this study, we use the IPC technology classification code to estimate the overall life cycle and the speed of development of the artificial intelligence technology. We collected patents related to artificial intelligence from 2008 to 2018, and analyze patent trends through one-dimensional statistical analysis, two-dimensional statistical analysis and network analysis. We expect that the technological trends of the artificial intelligence industry discovered from this study will be exploited to the strategies of the artificial intelligence technology and the policy making of the government.

The Study on Internet of Things(IoT) Ecosystem Analysis and Its Policy Direction in Gyeonggi Province (경기도 사물인터넷 생태계 분석을 통한 정책방향 수립에 관한 연구)

  • Kim, Myung Jin;Lee, Jihoon
    • Journal of the Economic Geographical Society of Korea
    • /
    • v.19 no.1
    • /
    • pp.18-32
    • /
    • 2016
  • In the Hyper-connected society, each country set up its own policy and central government as well as provincial government makes a basic plan of developing IoT. Gyeonggi provincial government needs to cope actively with the changing international and national circumstances. The purpose of this paper is to frame policy as a provincial government with analysis IoT industry-academia-institute-governments ecosystem and in-depth interview. There are IoT related SMEs in Gyeonggi, especially manufacturing business and device fields. Universities are doing IoT researches by R&D funds from central as well as provincial governments. Central government-affiliated Institutions are researching. It is necessary for Gyeonggi provincial government to establish policy in order to actively operate IoT ecosystem while each innovation actors are cooperated in doing IoT; system/governce maintenance, environments and test-bed for the application.

  • PDF

Spectrum Policy and Technologies for Promoting IoT Services (IoT 서비스 활성화를 위한 스펙트럼 정책 및 기술)

  • Kim, Young-Soo;Park, Duk-Kyu;Song, Kyeong-Min
    • The Journal of Korean Institute of Electromagnetic Engineering and Science
    • /
    • v.28 no.7
    • /
    • pp.528-539
    • /
    • 2017
  • Since IoT is expected to enable hyper-connected society to be realized with the advent of the $4^{th}$ Industrial Revolution, many advanced foreign countries as well as United Kingdom identified IoT spectrum policy as one of the first priority in spectrum management in order to cope with the frequency demands required for the promotion of IoT service. In Korea, the frequencies of 110 MHz bandwidth has been also supplied additionaly for IoT in July 2016 in order to activate a promising new IoT industry based on wireless communication, which has great potential for future industrial growth. Therefore, in this paper, we propose spectrum policy and the research and innovation trends on IoT to promote IoT industry by analyzing the major communication network, the key challenge technologies and the spectrum policy framework of foreign countries.

Adaptive Framework for Designing R&D Project Management Process Using Cloud Computing Technology (클라우드 컴퓨팅 기술을 활용한 적응형 연구개발 프로젝트 관리 프로세스 설계 프레임워크)

  • Shin, Kwang-Sup
    • The Journal of Society for e-Business Studies
    • /
    • v.18 no.4
    • /
    • pp.25-43
    • /
    • 2013
  • Two of the most important changes in the global market can be represented with Hyper-connection and Glocalization. To cope with these changes and secure the competitive advantages, it is essential to develop the standard organization, policy, processes and criteria for service management. In addition, the service management system is required to effectively support the R&D project management. In this research, an adaptive framework and system architecture for designing R&D project management process using cloud computing has been introduced. With the proposed system, it is able to overcome the limitations of traditional service management and treat the demand from the market in agility. Moreover, it may be possible to present more value than customers want and secure the competitive advantages in the global market with the proposed system.

Trend Analysis of IoT Technology Using Open Source (오픈소스를 이용한 IoT 기술의 동향 분석)

  • Kwon, Yong-Kwang;Kim, Sun-Young
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.20 no.3
    • /
    • pp.65-72
    • /
    • 2020
  • The Internet of Things(IoT) is to build a hyper-connected society through interconnection, and on this basis, to improve the quality of life and productivity, including solving social problems, and to become the next growth engine for the nation. The open common eco-system pursued by the IoT can start with the under- standing of the word 'open'. The IoT can achieve the expected effect of lowering the barriers to entry of technology development, and in these changes, OSSW and OSHW play a very important role in accelerating IoT eco-system maturity and breaking the boundaries between industries to promote convergence. Recently, it has developed into an intelligent IoT that combines artificial intelligence (AI) with the connectivity of the IoT. Here, I will analyze the direction of development of the IoT through understanding and analysis of open source.

Design of Smart Service based on Reverse-proxy for the Internet of Things (리버스 프록시 기반 IoT 서비스 도메인 설계)

  • Park, Jiye;Kang, Namhi
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.14 no.6
    • /
    • pp.1-6
    • /
    • 2014
  • The IoT (Internet of Things) is considered as a core technology to realize interconnected world. At this, companies composing ICT industry and standard organizations make efforts to accelerate it. IETF CoRE(Constrained RESTful Environment) working group standardized CoAP (Constrained Application Protocol) for the constrained device. CoAP has RESTful architecture and CoAP option is provided to use forward-proxy. The forward-proxy is used to translate protocol and perform requests on behalf of the client. However, communication between Internet based client and LLN(Low-power and Lossy Network) based CoAP server architecture has limitations to deploy real IoT service. In this architecture, problems like response delay, URI assignment and DoS attack can be occurred. To solve these problems, we propose the reverse-proxy based system. We consider both of static IoT and mobility IoT environments. Finally, our proposed system is expected to provide efficient IoT service.

Design and Implementation of The Capability Token based Access Control System in the Internet of Things (IoT에서 Capability 토큰 기반 접근제어 시스템 설계 및 구현)

  • Lee, Bum-Ki;Kim, Mi-Sun;Seo, Jae-Hyun
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.25 no.2
    • /
    • pp.439-448
    • /
    • 2015
  • IoT (Internet of Things) propels current networked communities into a advanced hyper-connected society/world where uniquely identifiable embedded computing devices are associated with the existing internet infrastructure. Therefore, the IoT services go beyond mere M2M (Machine-to-Machine communications) and should be able to empower users with more flexible communication capabilities over protocols, domains, and applications. In addition, The access control in IoT need a differentiated methods from the traditional access control to increase a security and dependability. In this paper, we describe implementation and design of the capability token based system for secure access control in IoT environments. In the proposed system, Authorities are symbolized into concepts of the capability tokens, and the access control systems manage the tokens, creation, (re)delegation and revocation. The proposed system is expected to decrease the process time of access control by using capability tokens.