• Title/Summary/Keyword: Digital Devices

Search Result 2,183, Processing Time 0.03 seconds

A Design of Secure Communication Framework for Device Management and User Authentication in Wireless Network Environment (무선 네트워크 환경에서 기기 관리 및 사용자 인증을 위한 안전한 통신 프레임워크 설계)

  • Park, JungOh
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.15 no.2
    • /
    • pp.43-52
    • /
    • 2019
  • The recent technological developments of smart devices, multiple services are provided to enhance the users' quality of life including smart city, smart energy, smart car, smart healthcare, smart home, and so on. Academia and industries try to provide the users with convenient services upon seamless technological research and developments. Also, whenever and wherever a variety of services can be used without any limitation on the place and time upon connecting with different types of devices. However, security weaknesses due to integrations of multiple technological elements have been detected resulting in the leakage of user information, account hacking, and privacy leakage, threats to people's lives by device operation have been raised. In this paper, safer communication framework is suggested by device control and user authentication in the mobile network environment. After implementations of registration and authentication processes by users and devices, safe communication protocol is designed based on this. Also, renewal process is designed according to the safe control of the device. In the performance evaluation, safety was analyzed on the attack of protocol change weakness occurred in the existing system, service halt, data leakage, illegal operation control of message, and so on, which confirmed the enhanced speed approximately by 8% and 23% in the communication and verification parts, respectively, compared to the existing system.

Method for Analyzing Media Compatibility in Home Networks (홈 네트워크에서 미디어 호환성 분석 기법)

  • Park, Yong-Suk;Kim, Hyun-Sik;Park, Se-Ho
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2014.05a
    • /
    • pp.641-643
    • /
    • 2014
  • The Digital Living Network Alliance (DLNA) specification enables sharing of multimedia contents in the home network. Ordinary users will assume multimedia compatibility among DLNA certified devices, but that is generally not the case. There are optional codecs and even proprietary codecs used by the manufacturers. Information on multimedia formats supported by the devices are in general not easily exposed, creating difficulties in media sharing and usage. In this paper, the contents directory information exchanges among DLNA devices over the network is analyzed, and a method for media compatibility analysis is provided, The user can get information on compatible media formats, enabling ease of DLNA system use.

  • PDF

Record File Carving Technique for Efficient File Recovery in Digital Forensic Investigation (디지털 포렌식 조사에서 효율적인 파일 복구를 위한 레코드 파일 카빙 기법)

  • Park, Minsu;Park, Jungheum;Lee, Sangjin
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.2 no.2
    • /
    • pp.93-102
    • /
    • 2013
  • These days digital data have become essential for digital investigation because most of the crime was occurred by using the digital devices. However, digital data is very easier to falsify or delete. If digital data was deleted, it is necessary to recover the deleted data for obtain digital evidence. Even though file carving is the most important thing to gather. digital evidence in digital forensic investigation, most of popular carving tools don't contemplate methods of selection or restoration for digital forensic investigation. The goal of this research is suggested files which can obtain useful information for digital forensic investigation and proposed new record file carving technique to be able to recover data effectively than before it.

A Study on a Reactive Power Control using Digital Filtering (디지털 필터링을 이용한 무효전력 제어에 관한 연구)

  • 우천희;강신준;이덕규;우광방;이성환
    • Journal of Institute of Control, Robotics and Systems
    • /
    • v.4 no.4
    • /
    • pp.517-524
    • /
    • 1998
  • This paper discusses the development of a reactive power controller using digital signal processing. Digital Signal Processing is the technique of using digital devices to Process continuous signals or data, often in real-time. And DSP algorithms are associated with a discrete time interval between input samples. When one designs a digital filter, one can use a Laplace transform to determine the continuous time frequency response. The corresponding discrete time transform is called Z transform and depends upon discrete samples of the input spaced equally in time. The objectives of this paper are to minimize real power losses and improve the power factor of a given system. Also, the implementation of a direct-form non recursive filter on the TMS320C31 has been described. The application of this microprocessor-based controller using DSP on test system reveals its numerous advantages. Performance and features of the controller for the reactive power control are analyzed.

  • PDF

Copyright Protection using Encryption of DCT Coefficients and Motion Vector in Video Codec of Mobile Device (모바일 기기내의 비디오 코덱에서 DCT 계수와 움직임 벡터의 암호화를 이용한 저작권 보호)

  • Kwon, Goo Rak;Kim, Young Ro
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.4 no.1
    • /
    • pp.41-46
    • /
    • 2008
  • With widespread use of the Internet and improvements in streaming media and compression technology, digital music, video, and image can be distributed instantaneously across the Internet to end-users. However, most conventional Digital Right Management are often not secure and fast enough to process the vast amount of data generated by the multimedia applications to meet the real-time constraints. In this paper, we propose the copyright protection using encryption of DCT coefficients and motion vector in MPEG-4 video codec of mobile device. This paper presents a new Digital Rights Management that modifies the Motion Vector of Macroblock for mobile device. Experimental results indicate that the proposed DRM can not only achieve very low cost of the encryption but also enable separable authentication to individual mobile devices such as Portable Multimedia Player and Personal Digital Assistants. The performance of the proposed methods have low complexity and low increase of bit rate in overhead.

A Comparative Study of Digital and Analogue System Environment to Retrieve Human Factor Elements for the Design of Operator Console (운전원 콘솔의 인간공학적 설계요소 추출을 위한 디지털과 아날로그 시스템 환경의 비교연구)

  • Cha, Woo-Chang
    • Journal of Korean Society of Industrial and Systems Engineering
    • /
    • v.32 no.2
    • /
    • pp.140-146
    • /
    • 2009
  • Since the computer technology has been drastically developed and broadly employed for the design of human machine system, human system interface was somehow digitalized. Actually the operator's working environment employing the digital devices are not be fully digitalized due to its technical constraints so that it has been changed to the hybrid environment which has a combination of digital and analog elements. The hybrid environments need to study its characteristics and the guidelines for the proper design and evaluation purpose. This paper describes the human factor design elements of the console operated under hybrid environment through studying the characteristics of digital and analog environment based on the related human factor guidelines and literatures. The result of this paper implies the contribution to the evaluation of the generic human working environment which digital and analog elements are jointly used.

Shared Key and Public Key based Mobile Agent Authentication Scheme supporting Multiple Domain in Home Network Environments (홈 네트워크 환경에서 다중 도메인을 지원하는 공유키 및 공개키 기반의 이동 에이전트 인증 기법)

  • 김재곤;김구수;엄영익
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.14 no.5
    • /
    • pp.109-119
    • /
    • 2004
  • The home network environment can be defined as a network environment, connecting digital home devices such as computer systems, digital appliances, and mobile devices. In this kind of home network environments, there will be numerous local/remote interactions to monitor and control the home network devices and the home gateway. Such an environment may result in communication bottleneck. By applying the mobile agents that can migrate among the computing devices autonomously and work on behalf of the user, remote interactions and network traffics can be reduced enormously. The mobile agent authentication is necessary to apply mobile agent concept to the home network environments, as a prerequisite technology for authorization or access control to the home network devices and resources. The existing mobile agent systems have mainly used the public key based authentication scheme, which is not suitable to the home network environments, composed of digital devices of limited computation capability. In this paper, we propose a shared key based mobile agent authentication scheme for single home domain and expand the scheme to multiple domain environments with the public key based authentication scheme. Application of the shared key encryption scheme to the single domain mobile agent authentication enables to authenticate the mobile agent with less overhead than the public key based authentication scheme.

A Study of Preventing Social Engineering Attack on Smartphone with Using NFC (NFC를 이용한 스마트폰 상의 사회 공학적 공격 방지 기법 연구)

  • Suh, Jangwon;Lee, Eunyoung
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.11 no.2
    • /
    • pp.23-35
    • /
    • 2015
  • When people stands near someone's mobile device, it can easily be seen by others. To rephrase this, attackers use human psychology to earn personal information or credit information or other. People are exposed by social engineering attacks. It is certain that we need more than just recommendation for the security to avoid social engineering attacks. This is why I proposed this paper. In this paper, I proposed an authentication technique using NFC and Hash function to stand against social engineering attack. Proposed technique result is showing that it could prevent shoulder surfing, touch event information, spyware attack using screen capture and smudge attack which relies on detecting the oily smudges left behind by user's fingers. Besides smart phone, IPad, Galaxy tab, Galaxy note and more mobile devices has released and releasing. And also, these mobile devices usage rate is increasing widely. We need to attend these matters and study in depth.

A bi-directional transmission of Railway signal for mass information (다정보 철도신호의 양방향 전송)

  • Park, Jeong-Soo;Jang, Dae-Sik;Ahn, Sang-Kwon;Kim, Yang-Mo
    • Proceedings of the KIEE Conference
    • /
    • 1996.07a
    • /
    • pp.632-634
    • /
    • 1996
  • In modern train systems, the high-speed and the high-density of train operation have been required. Effective train control systems need various information interchanged between the ground-site and on-board devices. So the systems are essential to the digital systems to admit lots of information and to raise the accuracy of transmission. In this paper, it is dealt with n bi-directional transmission of digital information between on-board devices and ground-site. Especially, this paper shows the experiment of bi-directional transmission of mass information by using transponder.

  • PDF

Implementation of an Instant Messenger Supporting Human-Human and Human-Thing Communication (사람-사람, 사람-사물의 대화를 지원하는 인스턴트 메신저 구현)

  • Choi, Jong Myung
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.5 no.1
    • /
    • pp.1-8
    • /
    • 2009
  • This paper is about the implementation of MyTalk, an instant messaging system, which supports human-human and human-thing communication. It consists of agents which are representatives of communication entities, and agent windows for user interfaces. Users can communicate with their buddies, and monitor and control remote "things" and devices with MyTalk. We also introduce the concept of agent window, which provides the most suitable GUIs (text, form, graph etc) for communication. Currently, MyTalk supports ordering goods, controlling devices like printers, monitoring sensors, managing applications, and real-time talk. Furthermore, we can extend it to application platform for remote monitoring, remote controlling, and real time cooperation.