• Title/Summary/Keyword: Device ID

Search Result 155, Processing Time 0.031 seconds

An Empirical Study on the Application of Drone based on LED-ID & RFID for Effective Stock Management of Unit Load Device - perspective of Air Cargo Terminal Case (항공화물 탑재용기(ULD)의 효율적 관리를 위한 LED-ID와 RFID 기반의 드론 적용 방안에 관한 연구- 항공화물터미널사례)

  • Baik, Namjin;Baik, Namkyu;Lee, Minwoo;Cha, Jae-Sang
    • Journal of Satellite, Information and Communications
    • /
    • v.12 no.4
    • /
    • pp.157-161
    • /
    • 2017
  • Effective management of ULD (Unit Load Device) in Air Cargo Transportation is one of the Airline's main concerns. At present, the way of management of ULD which has the ID tag based on RFID is carried by cargo control staff with PDA. However, the activity of ULD management is limitted due to complexity of cargo terminal facilities. In this study, we offer the effective way of management of ULD by the DRONE equipped by LED-ID & RFID READER at the higher altitude in Air Cargo Terminal to recover the difficulty of identification due to complexity of terminal facilities. Further to the above, we suggest the operational effectiveness, limitation, and the direction of future research.

A Study on Authentication ID using Identifier in Ad-hoc Network (Ad-hoc 네트워크에서 식별자를 이용한 인증 아이디에 관한 연구)

  • Moon, Jong-Sik;Byeon, Sang-Gu;Lee, Im-Yeong
    • Journal of Korea Multimedia Society
    • /
    • v.13 no.8
    • /
    • pp.1202-1211
    • /
    • 2010
  • The connection between devices in Ad-hoc network a network based on trust. Because a temporary device frequently join or leave, the authentication and security technology should be prepared for malicious device of a third-party attacks. The authentication scheme with the existing certification and ID, and the security technology using symmetric key and the public key is used. Therefore, in this paper we proposed two devices not having shared information use to generate each other's authentication ID. The use of authentication ID can establish the mutual trust and, provide security and efficiency for communication uses to generate a symmetric key.

Mobility Support Architecture in Locator-ID Separation based Future Internet using Proxy Mobile IPv6

  • Seok, Seung-Joon
    • Journal of the Korean Institute of Intelligent Systems
    • /
    • v.24 no.2
    • /
    • pp.209-217
    • /
    • 2014
  • Of several approaches for future Internet, separating two properties of IP address into locator and identifier, is being considered as a highly likely solution. IETF's LISP (Locator ID Separation Protocol) is proposed for this architecture. In particular, the LISP model easily allows for device mobility through simple update of information at MS (Mapping Server) without a separate protocol. In recent years, some of the models supporting device mobility using such LISP attributes have emerged; however, most of them have the limitation for seamless mobility support due to the frequent MS information updates and the time required for the updates. In this paper, PMIPv6 (Proxy Mobile IPv6) model is applied for mobility support in LISP model. PMIPv6 is a method that can support mobility based on network without the help of device; thus, this we define anew the behavior of functional modules (LMA, MAG and MS) to fit this model to the LISP environment and present specifically procedures of device registration, data transfer, route optimization and handover. In addition, our approach improves the communication performance using three tunnels identified with locators between mobile node and corresponding node and using a route optimized tunnel between MN's MAG and CN's MAG. Finally, it allows for seamless mobility by designing a sophisticated handover procedure.

Design of Patient Authentication Model in u-healthcare Environment using Coalition ID (연합 ID를 이용한 u-헬스케어 환경의 환자 인증 모델 설계)

  • Jeong, Yoon-Su
    • Journal of Digital Convergence
    • /
    • v.11 no.3
    • /
    • pp.305-310
    • /
    • 2013
  • To provide medical services to patients who have a terminal illness, recent hospital patients to monitor the state of the device attached to the body, the body insertion device is. U-Healthcare Environment and hospital officials indiscriminately exploited by the patient's vital information, however, could threaten the patient's life problems are appearing. In this paper, depending on the level of authority, hospital officials, Union of ID-based authentication model is proposed to use a patient's vital information. Union proposed model identify different authentication system is used in hospitals that exist in various forms in a number of ID information, health / medical information sharing between hospitals without exposure to unnecessary personal information, you can be assured of the anonymity. In particular, with easy access to patient information, hospital officials about the malicious act to protect patient information to access level for the rights granted by third parties to prevent easy access.

IP camera security using device unique identifier authentication (Device unique identifier인증을 이용한 IP Camera 인증 보안)

  • Kim, Ji-Hun;Kim, Young-kil;Hong, Man-pyo
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2018.05a
    • /
    • pp.82-85
    • /
    • 2018
  • The purpose of this paper is to improve the authentication method for IP camera user authentication. Since existing authentication uses knowledge-based authentication method, if ID and PW are exposed to attack by attacker, IP camera becomes defenseless from attacker. The attacker can access the IP Camera and acquire and distribute real time video and voice, which can be exploited as a second crime, and there is a fear of a secret leak when a secret facility is installed. In order to compensate for this vulnerability, this paper proposes a DUI authentication method that identifies and registers a device using DUI (Device Unique Identifier), blocks access to unauthorized devices by subordinating the device to the IP Camera and authenticates only authorized devices.

  • PDF

A Design of DA_UDC(Double Authentication User.Device.Cross) Module using OTA(One Time Authentication) Key in Home Network Environment (홈 네트워크 환경에서 OTA(One Time Authentication)키를 이용한 DA_UDC(Double Authentication User.Device.Cross) 모듈 설계)

  • Jeong, Eun-Hee;Lee, Byung-Kwan
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.34 no.4B
    • /
    • pp.419-427
    • /
    • 2009
  • This paper propose DA-UDC(Double Authentication User, Device, Cross) Module which solves the cost problem and the appropriation of Certificate using User Authentication, Device Authentication and Cross Authentication with OTA(One Time Authentication) Key, and which is designed not to subscribe to the service of Home network business. Home Server transmits its public key which is needed to create OTA to the user which passed the first step of authentication which verifies User ID, Device ID and Session Key. And it performs the second step of authentication process which verifies the OTA key created by a user. Whenever the OTA key of DA-UDC module is generated, the key is designed to be changed. Therefore, DA-UDC Module prevents the exposure of User and Device ID by performing the two steps of authentication and enhances the authentication security of Home Network from malicious user with OTA key. Also, DA-UDC Module is faster than the existing authentication system in processing speed because it performs authentication calculation only once. Though DA-UDC Module increases data traffic slightly because of the extra authentication key, it enhances the security more than the existing technique.

IP Camera Authentication and Key Exchange Protocol Using ID-Based Signature Scheme (ID 기반 서명 기법을 이용한 IP 카메라 인증 및 키 교환 프로토콜)

  • Park, Jin Young;Song, Chi-ho;Kim, Suk-young;Park, Ju-hyun;Park, Jong Hwan
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.28 no.4
    • /
    • pp.789-801
    • /
    • 2018
  • Currently widely used IP cameras provide the ability to control IP cameras remotely via mobile devices. To do so, the IP camera software is installed on the website specified by the camera manufacturer, and authentication is performed through the password between the IP camera and the mobile device. However, many products currently used do not provide a secure channel between the IP camera and the mobile device, so that all IDs and passwords transmitted between the two parties are exposed. To solve these problems, we propose an authentication and key exchange protocol using ID-based signature scheme. The proposed protocol is characterized in that (1) mutual authentication is performed using ID and password built in IP camera together with ID-based signature, (2) ID and password capable of specifying IP camera are not exposed, (3) provide forward-secrecy using Diffie-Hellman key exchange, and (4) provide security against external attacks as well as an honest-but-curious manufacturer with the master secret key of the ID-based signature.

An AAA Mechanism using ID-based Ticket offer Anonymity (익명성을 지원하는 ID기반 티켓을 이용한 AAA 메커니즘)

  • Moon, Jong-Sik;Paek, Chang-Hyun;Lee, Im-Yeong
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.17 no.5
    • /
    • pp.87-98
    • /
    • 2007
  • AAA protocol is an information protection technology which systematically provides authentication, authorization and accounting function not only in the existing wire network but also in the rapidly developing wireless network, various services and protocol. Nowadays, standardization of the various application services is in progress with the purpose of AAA standardization fer the mobile user in the wireless network. And various researches are being conducted fur using AAA in the roaming service and mobile IPv6 network between heterogeneous networks. In this paper uses OTP and ID-based ticket for user authentication in the mobile device under the ubiquitous environment, and service is seamlessly provided even though the mobile device moves from the home network to the foreign network. In addition, with the ticket renewed from the foreign network, the overhead of the home authentication server can be reduced, and provides anonymity of service through the anonymity ID.

A Study on Group Key Management based on Mobile Device ID in Ad-hoc network (Ad-hoc 네트워크에서 모바일 디바이스 아이디 기반의 그룹 키 관리에 대한 연구)

  • Kang, Seo-Il;Lee, Nam-Hoon;Lee, Im-Yeong
    • Journal of Korea Multimedia Society
    • /
    • v.12 no.4
    • /
    • pp.540-549
    • /
    • 2009
  • An arbitrary mobile device configures Ad-hoc network to provide the transmission of a data and services using wireless communications. A mobile device requires authentication and encryption key management to securely communicate in the Ad-hoc network. This paper examines the trend of the authentication in the Ad-hoc network and the group key management and suggests the plan for ID-based mutual authentication and group key establishment. ID-based mutual authentication in proposed scheme uses zero knowledge in the absence of shared information and is applied to establish a session key and group key. In addition, the proposed scheme is applied to Ad-hoc network to increase the efficiency and the safety of security technology.

  • PDF

SAW Device Reader Platform using FPGA (FPGA를 이용한 SAW Device Reader Platform 구현)

  • Son, Young-Tae;Kim, Young-Kil
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2010.05a
    • /
    • pp.447-450
    • /
    • 2010
  • SAW Device 라는 Passive 소자는 ID Tag나 소형센서들을 대체할 수 있는 MEMS 기술의 초소형 Device 다. 이 SAW Device를 이용하면 독립된 공간이나 전원이 필요한 센서 제어 등을 대신할 수 있을 것이다. 이렇게 활용범위가 확대됨에 따라 다양한 SAW Device를 사용하기 위한 플랫폼이 요구된다. 하지만 현재 SAW Sensor는 많은 발전을 해왔지만 SAW Sensor를 활용할 수 있는 플랫폼의 발전은 미흡하기 때문에 본 논문에서는 이러한 SAW Device를 측정할 수 있는 SAW Reader를 FPGA를 이용하여 좀 더 간단하고 효율적인 Reader platform을 구현해 보고자 한다.

  • PDF