• Title/Summary/Keyword: Automatic Access

Search Result 268, Processing Time 0.025 seconds

Vulnerability Analysis of Bluetooth Communication based on GNU Radio (GNU Radio 기반 블루투스 통신 취약점 분석)

  • Kim, Tae-Yong;Lee, Hoon-Jae
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.20 no.11
    • /
    • pp.2014-2020
    • /
    • 2016
  • In general, automatic access control management system using smart door-lock must be always exposed to security vulnerability during wireless communication based on Bluetooth. In particular, important information such as a secrete key can be exposed to the attacker when the authentication protocol has been operating in the wireless section. Therefore important information exchanged in the radio section needs to be properly encrypted. In order to analyze security vulnerability for automatic access control management system of public facilities such as subway vent, GNU Radio platform and HackRF device will be considered and experimented. Proposed experimental system to perform software based power analysis attack could be very effectively applied. As a result, important information such as packet type, CRC, length of data, and data value can be easily decoded from wireless packet obtained from HackRF device on GNU Radio platform. Constructed experimental system will be applied to avoid some security problems.

Development of The Home Control System Base on USB (USB에 기반한 홈 제어 시스템 개발)

  • Lee Chang-Goo;Kim Hee-Sun
    • Journal of Institute of Control, Robotics and Systems
    • /
    • v.12 no.4
    • /
    • pp.405-410
    • /
    • 2006
  • This paper presents the design of a USB home controller and a home control system that specially is focused on controlling home appliances as a part of home network systems, the implementation of the USB device access class in an OSGi service platform and a home security system as an application. Designed USB home controllers are able to control various home appliances. They can be used not only to control big home appliances like a boiler but also to control small home appliances like a toaster because they are low-cost solutions. The USB home controller supports real time control using the interrupt transfer of the USB specification. And It is easy to use by homemakers who have no technical knowledge of the system because they just plug and unplug it in a home server then it automatically joins and leaves a home control system. This technique is based on hot-plug and the USB Device Access class in an OSGi Service Platform. The USB Device Access class supports the coordination of automatic detection and attachment of the USB home controller on an OSGi Service Platform, and it downloads and installs device drivers on demand. For an application, we implemented and tested a home security system using two USB home controllers and a CDMA module.

Automatic Detection and Analysis of Desktop Bus'(D-Bus) Privilege Bypass in Tizen (타이젠 용 데스크톱 버스 (D-Bus) 권한 우회 취약점 분석 및 자동 탐지)

  • Kim, Dongsung;Choi, Hyoung-Kee
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.30 no.6
    • /
    • pp.1023-1030
    • /
    • 2020
  • Wearable devices, such as a smart watch and a wrist band, store owner's private information in the devices so that security in a high level is required. Applications developed by third parties in Tizen request for an access to designated services through the desktop bus (D-Bus). The D-Bus verifies application's privileges to grant the request for an access. We developed a fuzzing tool, so-called DAN (the D-bus ANalyzer), to detect errors in implementations for privilege verifications and access controls within Tizen's system services. The DAN has found a number of vulnerable services which granted accesses to unauthorized applications. We built a proof-of-concept application based on those findings to demonstrate a bypass in the privilege examination.

Automatic Encryption Method within Kernel Level using Various Access Control Policy in UNIX system (유닉스 시스템에서 다양한 접근제어 정책을 이용한 커널 수준의 자동 암호화 기법)

  • Lim, Jae-Deok;Yu, Joon-Suk;Kim, Jeong-Nyeo
    • The KIPS Transactions:PartC
    • /
    • v.10C no.4
    • /
    • pp.387-396
    • /
    • 2003
  • Many studies have been done on secure kernel and encryption filesystem for system security. Secure kernel can protect user or system data from unauthorized and/or illegal accesses by applying various access control policy like ACL, MAC, RBAC and so on, but cannot protect user or system data from stealing backup media or disk itself. In addition to access control policy, there are many studies on encryption filesystem that encrypt file data within system level. However few studies have been done on combining access control policy and encryption filesystem. In this paper we proposed a new encryption filesystem that provides a transparency to the user by integrating encryption service into virtual filesystem layer within secure kernel that has various access control policies. Proposed encryption filesystem can provide a simple encryption key management architecture by using encryption keys based on classes of MAC policy and overcome a limit of physical data security of access control policy for stealing.

A Study on Varieties of Subject Access and Usabilities of the National Library of Korea Subject Headings (주제 접근의 다양성과 국립중앙도서관 주제명 표목의 활용가능성에 관한 연구)

  • Chung, Yeon Kyoung
    • Journal of the Korean BIBLIA Society for library and Information Science
    • /
    • v.25 no.4
    • /
    • pp.171-185
    • /
    • 2014
  • The purposes of this study are to examine the various methods of subject access in the rapidly changing environment and to suggest the future of subject access in National Library of Korea (NLK). First of all, current status and problems of Library of Congress Subject Headings List as an representative subject headings in the world and the ways of improving effectiveness of subject retrieval were dealt with. As the ways of improving subject access, social bookmarking, folksonomy, tagging, facet applications, automatic assignment of keyword, thesauri, classification system, and auto-assigned search box were suggested. Finally, current status of NLK subject headings and the ways of improving for utilization of the subject headings as subject access were provided.

Implementation of An Automatic Authentication System Based on Patient's Situations and Its Performance Evaluation (환자상황 기반의 자동인증시스템 구축 및 성능평가)

  • Ham, Gyu-Sung;Joo, Su-Chong
    • Journal of Internet Computing and Services
    • /
    • v.21 no.4
    • /
    • pp.25-34
    • /
    • 2020
  • In the current medical information system, a system environment is constructed in which Biometric data generated by using IoT or medical equipment connected to a patient can be stored in a medical information server and monitored at the same time. Also, the patient's biometric data, medical information, and personal information after simple authentication using only the ID / PW via the mobile terminal of the medical staff are easily accessible. However, the method of accessing these medical information needs to be improved in the dimension of protecting patient's personal information, and provides a quick authentication system for first aid. In this paper, we implemented an automatic authentication system based on the patient's situation and evaluated its performance. Patient's situation was graded into normal and emergency situation, and the situation of the patient was determined in real time using incoming patient biometric data from the ward. If the patient's situation is an emergency, an emergency message including an emergency code is send to the mobile terminal of the medical staff, and they attempted automatic authentication to access the upper medical information of the patient. Automatic authentication is a combination of user authentication(ID/PW, emergency code) and mobile terminal authentication(medical staff's role, working hours, work location). After user authentication, mobile terminal authentication is proceeded automatically without additional intervention by medical staff. After completing all authentications, medical staffs get authorization according to the role of medical staffs and patient's situations, and can access to the patient's graded medical information and personal information through the mobile terminal. We protected the patient's medical information through limited medical information access by the medical staff according to the patient's situation, and provided an automatic authentication without additional intervention in an emergency situation. We performed performance evaluation to verify the performance of the implemented automatic authentication system.

A Study on the Automatic Measurement at an Unmanned Measuring Station Using Image Processing and Wireless Networks (화상처리 및 무선네트워크를 이용한 무인 측정 지점에서의 원격 계측 자동화에 관한 연구)

  • Lee, Han-Jun;Cha, Myung-Suk;Lee, Choong-Hoon
    • Transactions of the Korean Society of Machine Tool Engineers
    • /
    • v.16 no.3
    • /
    • pp.15-22
    • /
    • 2007
  • An automatic measurement system which collects experimental data at an unmanned station where the networking to the internet could not be accessed was developed. With a Robo-rail accessing to the unmanned station, wireless local networking between server PC at the Rob-rail and client PC at the unmanned station is possible within 30 m from an access point equipment located at the unmanned station. An algorithm for transferring the data file which is saved in the client PC at the unmanned station to the server PC in the Robo-rail was proposed. IEEE-1394 camera was used to collect the data at the client PC. An extracting program from the IEEE-1394 captured images to character data and number data was developed using image processing technique, which drastically reduces the size of data file comparing to that of the raw image file.

Distance Measurement by Automatic Peak Detection for Indoor Positioning Using Spread Spectrum Ultrasonic Waves

  • Suzuki, Akimasa;Miyara, Yasuaki;Iyota, Taketoshi;Kim, Young-Bok;Choi, Yong-Woon
    • Journal of Power System Engineering
    • /
    • v.19 no.2
    • /
    • pp.33-39
    • /
    • 2015
  • In conducting indoor positioning by code division multiple access using spread spectrum ultrasonic waves, it is required to detect signals under the influence of near-far problem occurred by difference on signal power, caused by distance between transmitter and receiver. For discussing robustness to the problem, we verified measuring accuracy on distance from an experiment on a real space with a hardware device where our proposed method is mounted. The proposed method performs automatic signal detection by setting threshold level dynamically. As an experimental result, measurable distance were improved by the proposed method, and measurement errors were up to 50mm in distances from 1000mm to 6000mm; therefore, enough accuracy to realize self-localization or navigation for autonomous mobile robot or human was obtained.

A PROPOSAL OF SEMI-AUTOMATIC INDEXING ALGORITHM FOR MULTI-MEDIA DATABASE WITH USERS' SENSIBILITY

  • Mitsuishi, Takashi;Sasaki, Jun;Funyu, Yutaka
    • Proceedings of the Korean Society for Emotion and Sensibility Conference
    • /
    • 2000.04a
    • /
    • pp.120-125
    • /
    • 2000
  • We propose a semi-automatic and dynamic indexing algorithm for multi-media database(e.g. movie files, audio files), which are difficult to create indexes expressing their emotional or abstract contents, according to user's sensitivity by using user's histories of access to database. In this algorithm, we simply categorize data at first, create a vector space of each user's interest(user model) from the history of which categories the data belong to, and create vector space of each data(title model) from the history of which users the data had been accessed from. By continuing the above method, we could create suitable indexes, which show emotional content of each data. In this paper, we define the recurrence formulas based on the proposed algorithm. We also show the effectiveness of the algorithm by simulation result.

  • PDF

On the Performance of Turbo Codes-Based Hybrid ARQ with Segment Selective Repeat in WCDMA

  • Shi Tao;Cao Lei
    • Journal of Communications and Networks
    • /
    • v.8 no.2
    • /
    • pp.212-219
    • /
    • 2006
  • In this paper, a new turbo codes-based hybrid automatic repeat request (TC-HARQ) scheme with segment selective repeat (SSR) is proposed. The main strategy is, upon retransmission, to repeat the data that are most important for the next round of decoding based on the distribution of residual errors after current decoding. The performance in terms of reliability and throughput is analyzed. To adapt to correlated fading channels where an inter-leaver is always employed before transmission, we further modify the SSR strategy so that data having experienced correlated deep fading are selected for retransmission. Finally, this proposed scheme is applied to the wideband code division multiple access (WCDMA) system under frequency selective fading channels. Simulation results demonstrate that in all single and multiple user cases, SSR-based TC-HARQ leads to significant throughput improvement with similar bit error rate (BER) performance as compared to type-I TC-HARQ.