• Title/Summary/Keyword: Access Point Control

Search Result 280, Processing Time 0.027 seconds

User Authentication Method Using Smartphone and Smartwatch (스마트폰과 스마트워치를 활용한 사용자 인증 기법)

  • Seo, Hwa-jeong
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.21 no.11
    • /
    • pp.2109-2114
    • /
    • 2017
  • Personal Identification Number (PIN) is the most common user-authentication method for the access control of private and commercial applications. The users need to enter PIN information to the applications whenever the users get access to the private services. However, the process imposes a burden on the users and is vulnerable to the potential shoulder-surfing attacks. In order to resolve both problems, we present a continuous authentication method for both smartphone and smartwatch, namely, synchronized authentication. First we analyze the previous smartwatch based authentication and point-out some shortcomings. In the proposed method, we verify the validity of user by analyzing the combined acceleration data of both smartphone and smartwatch. If the monitored sensor data shows the high correlations between them, the user is successfully authenticated. For the authentication test, we used the Samsung Galaxy Note5 and Sony Smartwatch2.

A Parallel Processing System for Visual Media Applications (시각매체를 위한 병렬처리 시스템)

  • Lee, Hyung;Pakr, Jong-Won
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.27 no.1A
    • /
    • pp.80-88
    • /
    • 2002
  • Visual media(image, graphic, and video) processing poses challenge from several perpectives, specifically from the point of view of real-time implementation and scalability. There have been several approaches to obtain speedups to meet the computing demands in multimedia processing ranging from media processors to special purpose implementations. A variety of parallel processing strategies are adopted in these implementations in order to achieve the required speedups. We have investigated a parallel processing system for improving the processing speed o f visual media related applications. The parallel processing system we proposed is similar to a pipelined memory stystem(MAMS). The multi-access memory system is made up of m memory modules and a memory controller to perform parallel memory access with a variety of combinations of 1${\times}$pq, pq${\times}$1, and p${\times}$q subarray, which improves both cost and complexity of control. Facial recognition, Phong shading, and automatic segmentation of moving object in image sequences are some that have been applied to the parallel processing system and resulted in faithful processing speed. This paper describes the parallel processing systems for the speedup and its utilization to three time-consuming applications.

A Study on the Spatial Allocation Planning of Dental Care Departments in Dental Hospital in Korea (한국 치과병원내 진료과목의 공간배분계획에 관한 연구)

  • Jeong, Taejong;Choi, Jaepil
    • Journal of The Korea Institute of Healthcare Architecture
    • /
    • v.23 no.4
    • /
    • pp.27-36
    • /
    • 2017
  • Purpose: The characteristics of spatial allocation planning in dentistry through examining the dental hospitals in Korea and comparison between them are necessary for the development of planning of the dental healthcare system. This study has been started to provide basic informations such as zoning, allocation distribution, and space configuration for the planning of dental hospital architecture. Methods: Literature review of dental care departments and investigation on current status of dental hospital in Korea have been conducted. The spatial allocation and space configuration of eleven dental hospitals have been analyzed. Results: The result of this study can be summarized in three points. The first one is that dental hospitals in Korea are consisted with eight to eleven dental care departments and they are divided with the horizontal allocation type with three to four departments in a floor for the spatial communication or the vertical allocation type with a department in each floor for the independent space. The second one is that oral medicine and oral maxillofacial radiology are located near the main entrance, orthodontics and pedodontic dentistry in lower level, prosthodontics in upper level, and conservative dentistry and periodontics have no specific spatial consideration. The third one is that the factors to consider the allocation planning are zoning for examination & diagnosis, basic practice, adolescence, surgery, circulations for patient, dentist, staff, different access for department like as easy access for reception and pedodontic dentistry, enclosure space for prosthodontics and surgery, frequency of visit and treatment care time, and change of treatment concept from treatment department to disease control corporative practice. Implications: This study is the starting point for the research of spatial configuration in dentistry and it is necessary to analyze the architectural planning to develop the dental healthcare system.

Implementation of IEEE 802.11n MAC using Design Methodology (통합된 구현 방식을 이용한 IEEE 802.11n MAC의 설계)

  • Chung, Chul-Ho;Lee, Sun-Kee;Jung, Yun-Ho;Kim, Jae-Seok
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.34 no.4B
    • /
    • pp.360-367
    • /
    • 2009
  • In this paper, we propose a design methodology of IEEE 802.11n MAC which aims to achieve the higher throughput of more than 100Mbps in downlink as measured at the MAC-SAP and present the implementation results of MAC using the proposed design methodology. With our proposed methodology, different from the conventional design flow which has the separate codes for the protocol validation, for the network simulation, and for the system implementation, the unified code can be used for the network simulation and the implementation of software and hardware. Our MAC architecture is partitioned into two parts, Upper-layer MAC and Lower-layer MAC, in order to achieve the high efficiency for the new features of IEEE 802.11n standard. They are implemented in software and hardware respectively. The implemented MAC is tested on ARM based FPGA board.

Design of Accounting and Security Sessions for IEEE 802.11 Network (무선랜 정보보호를 위한 accounting 및 보안 세션의 설계)

  • 양대헌;오경희;강유성;함영환;정병호
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.13 no.6
    • /
    • pp.85-96
    • /
    • 2003
  • Wireless LAM in itself is vulnerable to eavesdropping and modification attack, and thus, IEEE 802.11i and IEEE 802. 1x/1aa have been defined to secure the wireless channel. These protocols accompanied by RADIUS and EAP-TLS provide users of wireless LAM with integrity and confidentiality services, and also they perform authentication and access control of wireless ports. In this paper, we suggest a method to implement accounting session using authentication session of IEEE 802. 1x and accounting state machine is designed with the accounting session. Also, we propose a key exchange mechanism to establish secure channel between stations and an access point. The mechanism is designed to be inter-operable with IEEE 802. 1aa.

Cost-Effective Inter-LMA Domain Distributed Mobility Control Scheme in PMIPv6 Networks (PMIPv6 네트워크에서 비용효과적인 도메인 간의 분산 이동성 제어기법)

  • Jang, Soon-Ho;Jeong, Jong-Pil
    • The KIPS Transactions:PartC
    • /
    • v.19C no.3
    • /
    • pp.191-208
    • /
    • 2012
  • Proxy Mobile IPv6 (PMIPv6) is designed to provide network-based mobility management support to an MN without any involvement of the MN in the mobility related signalling, hence, the proxy mobility entity performs all related signalling on behalf of the MN. The new principal functional entities of PMIPv6 are the local mobility anchor (LMA) and the mobile access gateway (MAG). In PMIPv6, all the data traffic sent from the MN gets routed to the LMA through a tunnel between the LMA and the MAG, but it still has the single point of failure (SPOF) and bottleneck state of traffic. To solve these problems, various approaches directed towards PMIPv6 performance improvements such as route optimization proposed. But these approaches add additional signalling to support MN's mobility, which incurs extra network overhead and still has difficult to apply to multiple-LMA networks. In this paper, we propose a improved route optimization in PMIPv6-based multiple-LMA networks. All LMA connected to the proxy internetworking gateway (PIG), which performs inter-domain distributed mobility control. And, each MAG keeps the information of all LMA in PMIPv6 domain, so it is possible to perform fast route optimization. Therefore, it supports route optimization without any additional signalling because the LMA receives the state information of route optimization from PIG.

RMCS Plan and the Embodiment for the Home Network Service which is Safeent (안전한 Home Network 서비스를 위한 RMCS 설계 및 구현)

  • Sun, Jae-Hoon;Lee, Dong-Hwi;J. Kim, Kui-Nam
    • Convergence Security Journal
    • /
    • v.5 no.2
    • /
    • pp.19-27
    • /
    • 2005
  • As home network is increasing to use, home network industry is developing too. Also, it is to be a popular subject in the network's topics. In this reasons, home network become a important thing because home gateway function is working between access network and home network. In the home network, it relates on the personal computer, home pad, and digital television. But, home gateway is not prepared standard point about techniques. Therefore, many kind of technique want to try for developing of home gateway's functions. Usually, we use ID/PASSWORD method in network control system. But, we found a lot of problems about classical network system while we experienced Jan/25 big trouble. We are considering about that home network system are using same network net. Therefore, seriously we have to check about security and safety at the home network's environment. This report focus on the home network's environment to control for using and efficiency and then it wants to find ways to protect from the internal and external attacks. Existing ID/PASSWORD method it used a electronic signature and the security against the approach from of external watch, the MIB structure of role base and the security of the Home network which leads the authority control which is safe even from the Home network inside it strengthened it used compared to it proposed.

  • PDF

Safety Assessment on the Human Intrusion Scenarios of Near Surface Disposal Facility for Low and Very Low Level Radioactive Waste (저준위 및 극저준위 방사성폐기물 표층처분시설의 인간침입 시나리오 안전평가에 대한 고찰)

  • Hong, Sung-Wook;Park, Sangho;Park, Jin Beak
    • Journal of Nuclear Fuel Cycle and Waste Technology(JNFCWT)
    • /
    • v.14 no.1
    • /
    • pp.79-90
    • /
    • 2016
  • The second-stage near surface disposal facility for low and very low level radioactive waste's permanent disposal is to be built. During the institutional control period, the inadvertent intrusion of the general public is limited. But after the institutional control period, the access to the general public is not restricted. Therefore human who has purpose of residence and resource exploration can intrude the disposal facility. In this case, radioactive effects to the intruder should be limited within regulatory dose limits. This study conducted the safety assessment of human intrusion on the second-stage surface disposal facility through drilling and post drilling scenario. Results of drilling and post drilling scenario were satisfied with regulatory dose limits. The result showed that post-drilling scenario was more significant than drilling scenario. According to the human intrusion time and behavior after the closure of the facility, dominant radionuclide contributing to the intruder was different. Sensitivity analyses on the parameters about the human behavior were also satisfied with regulatory dose limits. Especially, manual redistribution factor was the most sensitive parameter on exposure dose. A loading plan of spent filter waste and dry active waste was more effective than a loading plan of spent filter waste and other wastes for the radiological point of view. These results can be expected to provide both robustness and defense in depth for the development of safety case further.

Accuracy Improvement of DEM Using Ground Coordinates Package (공공삼각점 위치자료를 이용한 DEM의 위치 정확도 향상)

  • Lee, Hyoseong;Oh, Jaehong
    • Korean Journal of Remote Sensing
    • /
    • v.37 no.3
    • /
    • pp.567-575
    • /
    • 2021
  • In order to correct the provided RPC and DEM generated from the high-resolution satellite images, the acquisition of the ground control point (GCP) must be preceded. This task is a very complicate that requires field surveys, GPS surveying, and image coordinate reading corresponding to GCPs. In addition, since it is difficult to set up and measure a GCP in areas where access is difficult or impossible (tidal flats, polar regions, volcanic regions, etc.), an alternative method is needed. In this paper, we propose a 3D surface matching technique using only the established ground coordinate package, avoiding the ground-image-location survey of the GCP to correct the DEM produced from WorldView-2 satellite images and the provided RPCs. The location data of the public control points were obtained from the National Geographic Information Institute website, and the DEM was corrected by performing 3D surface matching with this package. The accuracy of 3-axis translation and rotation obtained by the matching was evaluated using pre-measured GPS checkpoints. As a result, it was possible to obtain results within 2 m in the plane location and 1 m in height.

A Design of Computerizing System for Record Management of ULJIN Nuclear Power Plant (울진원자력발전소(原子力發展所) 자료관리업무(資料管理業務) 전산화(電算化) 연구(硏究)(I))

  • Park, Yong-Boo
    • Journal of the Korean Society for information Management
    • /
    • v.4 no.1
    • /
    • pp.154-169
    • /
    • 1987
  • The Computerizing Record Management System(RMS) has been developed for ULJIN Nuclear Power Plant in Korea on the basis of the Manual System. By means of review and analysis of processing flow & project requirements, system logics such as Receiving system, Logging system, Distribution system, Filing system, Indexing & Retrieval system and Output system of statistic and various reports, have been established for computerizing. Structure of Masterfile has been designed so as to include Bibliographic data, Transmittal data, Distribution data, Area data, RMS data for operation of Plant. The RMS data have been designed for construction and operation of the plant by adding index parameters for operation such as System code, KEPCO No., Component link code and Retention period on the point of receiving. The RMS has turned out an easy access to cross-reference between RMS and Material Control System.

  • PDF