• Title/Summary/Keyword: Control System Security

Search Result 1,725, Processing Time 0.031 seconds

QoS Guaranteed Secure Network Service Realization using Global User Management Framework (GUMF);Service Security Model for Privacy

  • Choi, Byeong-Cheol;Kim, Kwang-Sik;Seo, Dong-Il
    • 제어로봇시스템학회:학술대회논문집
    • /
    • 2005.06a
    • /
    • pp.1586-1589
    • /
    • 2005
  • GUMF (Global User Management Framework) that is proposed in this research can be applied to next generation network such as BcN (Broadband convergence Network), it is QoS guaranteed security framework for user that can solve present Internet's security vulnerability. GUMF offers anonymity for user of service and use the user's real-name or ID for management of service and it is technology that can realize secure QoS. GUMF needs management framework, UMS (User Management System), VNC (Virtual Network Controller) etc. UMS consists of root UMS in country dimension and Local UMS in each site dimension. VNC is network security equipment including VPN, QoS and security functions etc., and it achieves the QoSS (Quality of Security Service) and CLS(Communication Level Switching) functions. GUMF can offer safety in bandwidth consumption attacks such as worm propagation and DoS/DDoS, IP spoofing attack, and current most attack such as abusing of private information because it can offer the different QoS guaranteed network according to user's grades. User's grades are divided by 4 levels from Level 0 to Level 3, and user's security service level is decided according to level of the private information. Level 3 users that offer bio-information can receive secure network service that privacy is guaranteed. Therefore, GUMF that is proposed in this research can offer profit model to ISP and NSP, and can be utilized by strategy for secure u-Korea realization.

  • PDF

CNN Based 2D and 2.5D Face Recognition For Home Security System (홈보안 시스템을 위한 CNN 기반 2D와 2.5D 얼굴 인식)

  • MaYing, MaYing;Kim, Kang-Chul
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.14 no.6
    • /
    • pp.1207-1214
    • /
    • 2019
  • Technologies of the 4th industrial revolution have been unknowingly seeping into our lives. Many IoT based home security systems are using the convolutional neural network(CNN) as good biometrics to recognize a face and protect home and family from intruders since CNN has demonstrated its excellent ability in image recognition. In this paper, three layouts of CNN for 2D and 2.5D image of small dataset with various input image size and filter size are explored. The simulation results show that the layout of CNN with 50*50 input size of 2.5D image, 2 convolution and max pooling layer, and 3*3 filter size for small dataset of 2.5D image is optimal for a home security system with recognition accuracy of 0.966. In addition, the longest CPU time consumption for one input image is 0.057S. The proposed layout of CNN for a face recognition is suitable to control the actuators in the home security system because a home security system requires good face recognition and short recognition time.

File Sharing Algorithm based Mutual Cooperation using Smart Device (스마트 기기를 이용한 상호 협력 기반 파일 공유 시스템)

  • Jeong, Pil-Seong;Cho, Yang-Hyun
    • Journal of the Korea Convergence Society
    • /
    • v.9 no.12
    • /
    • pp.53-60
    • /
    • 2018
  • With the development of information and communication technology, we have been able to access and manage documents containing corporate information anytime and anywhere using smart devices. As the work environment changes to smart work, the scope of information distribution is expanded, and more efforts are needed to manage security. This paper proposes a file sharing system that enables users who have smart devices to manage and share files through mutual cooperation. Proposed file sharing system, the user can add a partner to share files with each other when uploading files kept by spliting the part of the file and the other uses an algorithm to store on the server. After converting the file to be uploaded to base64, it splits it into encrypted files among users, and then transmits it to the server when it wants to share. It is easy to manage and control files using dedicated application to view files and has high security. Using the system developed with proposed algorithm, it is possible to build a system with high efficiency even for SMEs(small and medium-sized enterprises) that can not pay much money for security.

A Study of the PMI-based XML Access Control Model in Consideration of the Features of the Public Organization (공공기관의 특성을 고려한 PMI기반의 XML 접근제어 모델에 관한 연구)

  • Cho, Chang-Hee;Lee, Nam-Yong
    • Journal of Information Technology Services
    • /
    • v.5 no.3
    • /
    • pp.173-186
    • /
    • 2006
  • The local public organizations, to secure the Confidentiality, Integrity, Authentication and Non-Repudiation of cyber administrative environment is giving it a try to consolidate the official documents among them by standardizing all the documents into XML formats together with the establishment of the GPKI(Government Public Key Infrastructure). The Authentication System based on the PKI(Public Key Infrastructure) used by the GPKI, however, provides only the simple User Authentication and thus it results in the difficulty in managing the position, task, role information of various users required under the applied task environment of public organizations. It also has a limitation of not supporting the detailed access control with respect to the XML-based public documents.In order to solve these issues, this study has analyzed the security problems of Authentication and access control system used by the public organizations and has drawn the means of troubleshoot based on the analysis results through the scenario and most importantly it suggests the access control model applied with PMI and SAML and XACML to solve the located problem.

Development of Secure Access Control System for Location Information on Smart Phone (스마트폰 위치정보에 대한 안전한 접근제어 시스템 개발)

  • Jang, Won-Jun;Lee, Hyung-Woo
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.21 no.2
    • /
    • pp.139-147
    • /
    • 2011
  • More convenient and value-added application services can be provided to user in case of using location-based service on Smart phone. However, privacy problem will be happen when an application disclosures the personal location information. Therefore, each user should securely control and manage his own personal location information by specifying access control list and profiles. In this study, we implemented personal location information self-control protocol and developed secure personal location management system with OTP based authentication procedure.

A Study on Analysis and Control of Circumvent Connection to the Private Network of Corporation (기업 사설 네트워크 우회 접속 분석 및 통제 대책 연구)

  • Lee, Chul-Won;Kim, Huy-Kang;Lim, Jong-In
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.20 no.6
    • /
    • pp.183-194
    • /
    • 2010
  • A company's private network protected by a firewall and NAT(Network Address Translation) is not accessible directly through an external internet. However, as Reverse Connection technology used by NetCat extends to the technologies such as SSH Tunnel or HTTP Tunnel, now anyone can easily access a private network of corporation protected by a firewall and NAT. Furthermore, while these kinds of technologies are commercially stretching out to various services such as a remote control and HTTP Tunnel, security managers in a company or general users are confused under the circumstances of inner or outer regulation which is not allowed to access to an internal system with a remote control. What is more serious is to make a covert channel invading a company's private network through a malicious code and all that technologies. By the way, what matters is that a given security system such as a firewall cannot shield from these perceived dangers. So, we analyze the indirect access of technological methods and the status quo about a company's internal network and find a solution to get rid of the related dangers.

A study on the implementation of the wireless video security system (무선 영상보안시스템 구현에 관한 연구)

  • Kim, Young-Min;Kim, Myeong-Hwan;Kim, Sun-Hyung
    • Asia-Pacific Journal of Business Venturing and Entrepreneurship
    • /
    • v.7 no.1
    • /
    • pp.99-104
    • /
    • 2012
  • In this paper, implementation of a wireless video security system relates to a situation outside of using infrared sensors to detect changes when using Zigbee network security in the area of the sensor sends information to the server. The server can judge the situation if an emergency situation through the IP network security camera shot of the area to be transferred command to pantilte. The camera images and information in the security area, sent to administrator's smartphone users to control the camera can see the situation and More than a small video security system was designed so that user can monitor the security zone. Finally, for real-time to identify and respond to emergency situations based on the available wireless networks for video surveillance systems were verified through research and implementation.

  • PDF

Token-Based IoT Access Control Using Distributed Ledger (분산 원장을 이용한 토큰 기반 사물 인터넷 접근 제어 기술)

  • Park, Hwan;Kim, Mi-sun;Seo, Jae-hyun
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.29 no.2
    • /
    • pp.377-391
    • /
    • 2019
  • Recently, system studies using tokens and block chains for authentication, access control, etc in IoT environment have been going on at home and abroad. However, existing token-based systems are not suitable for IoT environments in terms of security, reliability, and scalability because they have centralized characteristics. In addition, the system using the block chain has to overload the IoT device because it has to repeatedly perform the calculation of the hash et to hold the block chain and store all the blocks. In this paper, we intend to manage the access rights through tokens for proper access control in the IoT. In addition, we apply the Tangle to configure the P2P distributed ledger network environment to solve the problem of the centralized structure and to manage the token. The authentication process and the access right grant process are performed to issue a token and share a transaction for issuing the token so that all the nodes can verify the validity of the token. And we intent to reduce the access control process by reducing the repeated authentication process and the access authorization process by reusing the already issued token.

Design of Security Monitoring and Control System according to Security Control Area (보안통제영역에 따른 보안관제 시스템 설계 연구)

  • Lee, Hwangro;Choi, Eunmi
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2015.04a
    • /
    • pp.456-459
    • /
    • 2015
  • 인터넷 활용이 다양해짐에 따라서, 사이버 상의 특정 조직에 대한 표적공격에서부터 불특정 다수에 대한 공격까지 불법적인 경로를 통해 목적을 달성하거나 금전적인 이득을 취하기 위한 사이버 공격기법은 갈수록 그 경로가 다양해지고 치밀해지고 있다. 스마트폰의 등장과 함께 휴대용 기기의 사용은 급증하였고, 휴대성과 편리성은 많은 사람들의 서비스 이용환경을 데스크톱환경에서 이동환경으로 변화되고 있다. 이러한 환경의 변화는 보안위협 경로를 확장시킨다. 지능적이고 다양해진 보안 위협으로부터 조직의 시스템에 대한 통합적 가시성을 확보하는 일은 위협에 대비할 수 있는 방법을 제공할 수 있게 된다. 본 연구에서는 보안위협이 될 수 있는 상황을 탐지하기 위해서 조직의 특성에 맞는 보안정책을 수립하는 방법에 대해 정리하고 이에 따른 보안 관제와 운영을 할 수 있는 시스템 설계 방법을 제안하고자 한다.

A Study on the Prevention of Smartcard Forgery and Alteration Using Angular Multiplexing and Private Key Multiplexing based on Optical Encryption (영상 암호화 기반에서의 각다중화 및 암호키 다중화 기법을 이용한 스마트카드 위 .변조 방지에 관한 연구)

  • 장홍종;이성은;이정현
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.11 no.3
    • /
    • pp.63-69
    • /
    • 2001
  • Smartcard is highlighted as infrastructure that has an excellent security for executing functions such as user authentication, access control, information storage and control, and its market is expanding rapidly. But possibilities of forgery and alteration by hacking are increasing as well. This paper proposes a method to prevent card forgery and alteration using angular multiplexing and private key multiplexing method on optical encryption, and proposed a Public Key Infrastructure(PKI)-based authentication system combined with One-Time Password (OTP) for verification of forgery and alteration .