• Title/Summary/Keyword: 프라이버시 침해

Search Result 441, Processing Time 0.031 seconds

Mechanism of RFID Authentication for u-Vehicle (u-Vehicle 환경에 적합한 RFID 인증 메커니즘)

  • Rhee, Yoon-Jung;Kim, Do-Hyeon
    • The Journal of the Korea Contents Association
    • /
    • v.8 no.6
    • /
    • pp.66-73
    • /
    • 2008
  • The concept of u-Vehicle is a technological model that people try to build the ubiquitous world in the car which moves, by using the RFID technology as well as the telematics service based on the location. RFID is weak on the point of information security because RFID has possibility for being abused such as chasing, counterfeiting, and invading personal privacy. RFID's tags use a weak cryptographic algorithm. This paper presents the vulnerabilities of information security under u-Vehicle environments. To solve that, we propose a mechanism enhancing RFID tag's security but with low cost by reducing the number of mutual authentication stages and using the hash function.

무인항공기(드론) 사고의 법적책임 연구

  • Choe, Byeong-Rok
    • Proceedings of the Korea Technology Innovation Society Conference
    • /
    • 2017.05a
    • /
    • pp.71-79
    • /
    • 2017
  • 조종사가 탑승하지 않고도 지정된 임무를 수행할 수 있도록 제작된 무인항공기(드론)가 다양한 장비(광학, 적외선, 레이더 센서 등)를 탑재하여 활용되고 있다. 지금까지는 국가안보 유지 수단으로서 감시 정찰 정밀공격무기의 유도 등의 임무를 수행하여 왔다. 최근에는 민간부문에서도 다양한 용도로 활용되고 있어서 정부(국토교통부 산업통상자원부)는 무인항공기의 국내경제발전의 파급효과를 인지하고, 세계 무인항공기시장에서 우선순위를 선점하기 위해 투자확대를 기해 왔다. 무인항공기시장이 산업발전과 고용촉진에 도움이 되어 국내경제에 긍정적인 효과가 많다고 하더라도 무인항공기의 안전운행을 담보할 다양한 법적 제도적인 장치의 마련이 필요하다. 따라서 무인항공기로 야기되는 다양한 유형의 사고를 검토하여 이에 대한 법적 책임에 대한 분석이 필요하다. 무인항공기의 사고는 운영자의 운영상의 과실로 인한 사고도 있고 무인항공기 자체의 결함으로 인한 사고도 발생할 수 있다. 또한 운행자의 고의과실로 인한 타인의 권리(프라이버시권 등)를 침해하는 경우나 무인항공기끼리의 충돌사고도 발생할 수 있다. 이러한 사고로 인한 책임은 민사책임으로서 대부분 지상 제3자에 대한 생명 신체 또는 재산상의 손해배상책임이다. 이러한 책임을 규율하는 국제협약으로 로마협약이 있지만 체약국이 없기 때문에 국제협약으로서의 역할을 못하고 있다. 따라서 현재로서는 각국의 국내법에 의하여 해결될 가능성이 많을 것으로 생각된다. 무인항공기 운영자의 과실로 인한 사고는 민법이나 상법이 적용될 수 있고, 무인항공기의 제작결함으로 인해 사고가 발생하였을 경우와 시스템의 오작동으로 인해 사고가 발생하였다면 제조물 책임을 물어야 할 경우도 있을 수 있다. 이러한 법적 쟁점에 대한 검토를 통하여 무인항공기 공급과 활용의 확대로 인한 다양한 사고발생과 책임범위를 명확히 하여 사고당사자들의 책임관계를 인식시키는 것이 필요하다.

  • PDF

Group Key Management Method for Secure Device in Smart Home Environment (스마트홈 환경에서의 안전한 디바이스 관리를 위한 그룹키 관리 기법)

  • Ryu, Ho-Seok;Kwak, Jin
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.25 no.2
    • /
    • pp.479-487
    • /
    • 2015
  • According to IT development, smart home services is providing remote service, monitoring service and other various services through smart home devices based on network. But, smart home environment exists security threats such as data falsification, illegal authentication and invasion of privacy through a malicious device. Smart home is studying to prevent these security threats, but the studies of smart home environment security are still in early stage of development and the studies of group key management method is lacking in smart home. In this paper, we propose the group key management method for secure device in smart home.

Mutual Authentication Protocol Of The Low-cost RFID Using Random Partial ID (랜덤 부분 ID를 이용한 저비용 RFID 상호인증 프로토콜)

  • Li Yong-Zhen;Mun Hyung-Jin;Jeong Yoon-Su;Lee Sang-Ho
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.31 no.7C
    • /
    • pp.755-761
    • /
    • 2006
  • Previous RFID technique, it is recognizable without the physical contact between the reader and the tag, causes the serious privacy infringement such as excessive information exposure and user's location information tracking due to the wireless characteristics. Especially the information security problem of read only tag is solved by physical method. In this paper, we propose a low-cost mutual authentication protocol which is adopted to read-only tag and secure to several attacks using XOR and Partial ID. The proposed protocol is secure against reply attacking, eavesdropping, spoofing attacking and location tracking.

A Study on The Utilization and Secure Plan of Security in Social Media (소셜 미디어 이용 현황과 보안대책에 관한 연구)

  • Cheon, Woo-Bong;Park, Won-Hyung;Chung, Tai-Myoung
    • Convergence Security Journal
    • /
    • v.10 no.3
    • /
    • pp.1-7
    • /
    • 2010
  • One of celebrities using Social media caught public's eye and interest in Korea. Thereby the number of the user has grown rapidly and by last year it had reached to about 770 million. But at the same time, it has brought us social issues such as invasion of privacy, spreading of malicious code, and stealing of ID. To solve these problems, first the government need to establish adequate law and policy. Second, Service provider should remove vulnerability in the security system and filter illegal information. Third, individual user should put more effort to protect their own privacy. This paper will suggest a solution of using the Social media more sound and secure.

The design of Biometrics System to enhance the security through the Distributed Stored of Multiple Split bio_Templates (생체정보 다분할 분산저장 기법을 통한 보안성 향상의 생체인증 시스템 설계)

  • Hong, Yoon Kee;Yoon, Ji Won
    • Convergence Security Journal
    • /
    • v.16 no.7
    • /
    • pp.31-39
    • /
    • 2016
  • The biometrics information is very useful by the convenience of ownership and using. but the risk of crime of malicious re-uses and infringement of personal privacy exist because the biometrics information is impossible to change typically when the illegal interception occurred from others. therefore the importance of security on stored management of biometrics information has been increased steadily. the existing biometric authentication system has been stored only encrypted complete template at a single storage place. In this paper, we designed the Distributed Stored of Multiple Split bio_Template System that a template is divided in different ways by each user and stored in other storage places from personal information to relieve user's anxiety about the saved template and illegally leaked through restored only template to authenticate and then delete.

A Security Module for Vehicle Network Communication (차량 네트워크 통신용 보안 모듈)

  • Kwon, Byeong-Heon;Park, Jin-Sung
    • Journal of Digital Contents Society
    • /
    • v.8 no.3
    • /
    • pp.371-376
    • /
    • 2007
  • Many modules such as controller, sensor, telematics terminal, navigation, audio and video are connected each other via vehicle network (CAN, MOST, etc). Futhermore, users can have ITS or internet services in moving by connecting to wireless mobile network. These network capabilities can cause a lots of security issues such as data hacking, privacy violation, location tracking and so on. Some possibilities which raise a breakdown or accident by hacking vehicle operation data (sensor, control data) are on the increase. In this paper, we propose a security module which has encryption functionalities and can be used for vehicle network system such as CAN, MOST, etc. This security module can provide conventional encryption algorithms and digital signature processing functionality such as DES, 3-DES, SEED, ECC, and RSA.

  • PDF

Measuring and Analyzing WiMAX Security adopt to Wireless Environment of U-Healthcare (유헬스케어의 무선환경에 적합한 WiMAX 보안 측정 및 분석)

  • Jeong, Yoon-Su
    • Journal of Digital Convergence
    • /
    • v.11 no.3
    • /
    • pp.279-284
    • /
    • 2013
  • Wireless access network section needs strong security which supports high data rate and mobility not to invade patient's privacy by exposing patient's sensitive biometric from automatic implantable device that is adapted to u-healthcare service. This paper builds test bed and performs assessment and measurement of security ability of WiMAX network to transmit and receive mobile patient's biometric by building WiMAX network in wireless access network not to expose paitne's biometirc at wireless access network section to the third person. Specially, this paper compares and assesses data security, MAC control message security, handover conection delay, and frame loss and bandwidth of ECDH at the layer of WiMAX security compliance, WiMAX MAC IPSec, and MAC.

Folksonomy-based Personalized Web Search System (폭소노미 기반 개인화 웹 검색 시스템)

  • Kim, Dong-Wook;Kang, Soo-Yong;Kim, Han-Joon;Lee, Byung-Jeong
    • Journal of Digital Contents Society
    • /
    • v.11 no.1
    • /
    • pp.105-115
    • /
    • 2010
  • Search engines provide web documents that are related to user's query. However, using only the query terms that user provided, it is hard for search engines to know user's exact intention and provide the very matching web documents. To remedy this problem, search systems are needed to exploit personalized search technologies. In this paper, we propose not only a novel personalized query recommendation scheme based on folksonomy but also a new personalized search service architecture which reduces the risk of privacy violation while enabling search service providers to provide other various personalized services such as personalized advertisement.

A Study on the Psychological anxiety on Private information leakage to likelihood of internet users (인터넷 이용자의 개인정보 유출 가능성에 대한심리적 불안에 관한 연구: 성별, 이용량, 이용 빈도를 중심으로)

  • Jin, Seong-Cheol;Kim, In-Kyung
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.6 no.5
    • /
    • pp.731-737
    • /
    • 2011
  • The purpose of this study is to examine Internet users' psychological anxiety about the possibility of personal information leakage. The investigator examined the difference of psychological anxiety focusing on the possibility of personal information leakage according to the use amount of Internet, the number of joined sites and the frequency of e-commerce transaction. Study findings show that women felt more psychological anxiety than men did. In addition, people who used Internet more frequently felt more psychological anxiety. However, the number of joined sites and the average frequency of e-commerce transaction in a month had no significant influence upon users' psychological anxiety about the possibility of personal information leakage.