• Title/Summary/Keyword: Door Security

Search Result 100, Processing Time 0.023 seconds

Design and Implementation of Low Power Container Security Device based on IEEE 802.15.4 (IEEE 802.15.4 기반 저전력 컨테이너 보안장치의 설계 및 구현)

  • Park, Se-Young;Kim, Taek-Hyun;Choi, Hoon;Baek, Yun-Ju
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.35 no.2B
    • /
    • pp.215-224
    • /
    • 2010
  • A container security device (CSD) monitors intrusions through the cargo door; it is a reduced function device that uses IEEE 802.15.4 with a beacon mode. However, in the beacon mode, the CSD consumes too much battery power in periodical idle listening and sensing trials. Moreover, the CSD cannot send the message to the CSD reader actively, and it makes big latency problem. Therefore, we propose a low-power CSD to reduce the unnecessary power consumption. The proposed CSD follows the requirements of the U.S. Department of Homeland Security, and reduces battery consumption through a power-efficient hardware design, a night-watch mechanism for low-power operation and low-power sensing to reduce unnecessary monitoring. And the CSD sends alert message to the CSD reader. Simulation results show that our CSD reduces battery consumption by over 70% through the night-watch mechanism and by approximately 80% through the low-power sensing. And the CSD can send the alert message to the remote CSD reader by over 94%.

Implementation of Home Security System using a Mobile App (모바일 앱을 이용한 홈 시큐리티 시스템 구현)

  • Kwon, Young-Il;Jeong, Sam-Jin
    • Journal of Convergence for Information Technology
    • /
    • v.7 no.4
    • /
    • pp.91-96
    • /
    • 2017
  • In this paper, we aim to respond efficiently to crime by using Arduino and smartphone apps in response to increasing number of house-breaking crimes. It receives the signal of the sensor installed in the house and connects it with the app of the smartphone. To use the app, you can download the app from the user's smartphone, launch the app, and operate the operation outside the home, not only inside the house, by linking the executed app. Among the sensors installed in the house, the movement detection sensor is used to enhance the security, and the gas leakage sensor and the flame detection sensor can be used to easily detect the risk of fire and to prevent the fire early. Security is further enhanced by the ability to remotely control the front door with a smartphone. After that, various sensors can be added and it can be developed as a WiFi module in addition to the Bluetooth module.

A Study on the Causes of Security Vulnerability in 'Wall Pads' ('월패드'의 보안 취약 원인에 관한 고찰)

  • Kim Sang Choon;Jeon Jeong Hoon
    • Convergence Security Journal
    • /
    • v.22 no.2
    • /
    • pp.59-66
    • /
    • 2022
  • Recently, smart home technology has been developed with a great response due to the convenience of home automation. Smart home technology provides various services by connecting various Internet of Things (IoT) and sensors to a home network through wired/wireless networks. In addition, the smart home service easily and conveniently controls lighting, energy, environment, and door cameras through a wall pad. However, while it has become a social issue due to the recent hacking accident of wall pads, personal information leakage and privacy infringement are expected. Accordingly, it is necessary to prepare preventive and countermeasures against security vulnerability factors of wall pads. Therefore, this study expects that it can be used as basic data for future smart home application and response technology development by examining the weak causes and countermeasures related to wall pads.

Interoperable Security Framework for Heterogeneous IoT Platforms (이종 사물인터넷 플랫폼 간 보안 상호운용을 위한 프레임워크)

  • Oh, Se-Ra;Kim, Young-Gab
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.7 no.3
    • /
    • pp.81-90
    • /
    • 2018
  • Due to the dramatic advancement of IoT (Internet of Things), it is expected that tens of billions of IoT devices will be connected by the year 2024. Furthermore, as IoT technologies evolves, the security management in IoT platforms has become a critical issue. For example, there are interworking problems between heterogeneous IoT platforms caused by differences from communication protocols, security policies, etc. in each platform. In addition, unsecured interworking can cause major security issues including the information leakage. In this paper, in order to solve these problems, a security interworking architecture is proposed and implemented in both FIWARE and oneM2M, which are representative IoT platforms. First, the security architecture of FIWARE is analyzed and implemented, and then the security framework based on OAuth 2.0 is developed on Mobius platform. Finally, in order to validate the proposed security interworking architecture, a LED (Light-Emitting Diode) example, where the LED is controlled by only authorized users, is developed. The proposed architecture can be extended to the diverse IoT platforms and devices.

Development of Data Fusion Human Identification System Based on Finger-Vein Pattern-Matching Method and photoplethysmography Identification

  • Ko, Kuk Won;Lee, Jiyeon;Moon, Hongsuk;Lee, Sangjoon
    • International Journal of Internet, Broadcasting and Communication
    • /
    • v.7 no.2
    • /
    • pp.149-154
    • /
    • 2015
  • Biometric techniques for authentication using body parts such as a fingerprint, face, iris, voice, finger-vein and also photoplethysmography have become increasingly important in the personal security field, including door access control, finance security, electronic passport, and mobile device. Finger-vein images are now used to human identification, however, difficulties in recognizing finger-vein images are caused by capturing under various conditions, such as different temperatures and illumination, and noise in the acquisition camera. The human photoplethysmography is also important signal for human identification. In this paper To increase the recognition rate, we develop camera based identification method by combining finger vein image and photoplethysmography signal. We use a compact CMOS camera with a penetrating infrared LED light source to acquire images of finger vein and photoplethysmography signal. In addition, we suggest a simple pattern matching method to reduce the calculation time for embedded environments. The experimental results show that our simple system has good results in terms of speed and accuracy for personal identification compared to the result of only finger vein images.

UML Modeling to TM Modeling and Back

  • Al-Fedaghi, Sabah
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.1
    • /
    • pp.84-96
    • /
    • 2021
  • Certainly, the success of the Unified Modeling Language (UML) as the de facto standard for modeling software systems does not imply closing the door on scientific exploration or experimentation with modeling in the field. Continuing studies in this area can produce theoretical results that strengthen UML as the leading modeling language. Recently, a new modeling technique has been proposed called thinging machine (TM) modeling. This paper utilizes TM to further understand UML, with two objectives: (a) Fine issues in UML are studied, including theoretical notions such as events, objects, actions, activities, etc. Specifically, TM can be used to solve problems related to internal cross-diagram integration. (b) TM applies a different method of conceptualization, including building a model on one-category ontology in contrast to the object-oriented paradigm. The long-term objective of this study is to explore the possibility of TM complementing certain aspects in the UML methodology to develop and design software systems. Accordingly, we alternate between UML and TM modeling. A sample UML model is redesigned in TM, and then UML diagrams are extracted from TM. The results clarify many notions in both models. Particularly, the TM behavioral specification seems to be applicable in UML.

Smart Home System Using Internet of Things

  • Santoso, Leo Willyanto;Lim, Resmana;Trisnajaya, Kevin
    • Journal of information and communication convergence engineering
    • /
    • v.16 no.1
    • /
    • pp.60-65
    • /
    • 2018
  • The Internet of Things (IoT) is happening now. By implementing IoT, we can build smart home system. Smart home is an application that is a combination of technology and services that specialize in the home environment with specific functions aimed at improving the efficiency, comfort and security of the occupants. Smart homes filled with connected products are loaded with possibilities to make our lives easier, more convenient, and more comfortable. This intelligent home system uses a microcontroller to process functions that provided by smart home system, such functions as RFID for door access and PIR sensors for motion detection. By using Android users could control the sensors anytime and anywhere. Microcontroller used is Arduino IDE with WeMos D1R2 board. Based on the testing process, there was a successful communication between the components of the device, sensors, and Android devices. Users could open or close the solenoid, users can also turn off or turn on electronic devices using Android.

Study on the Horizontally Installed Emergency Exit in Apartment Houses (아파트 하향식 피난구에 대한 고찰)

  • Yeo, In-Hwan;Min, Byung-Yeol
    • Proceedings of the Korean Institute of Building Construction Conference
    • /
    • 2010.05b
    • /
    • pp.91-93
    • /
    • 2010
  • Recently, the regulation about HEE(horizontally installed emergency exit) established at upper 4story in apartment houses was introduced by revising enforcement degree of Building Act. HEE is a facility for egress to lower story through floor breach and ladder system so that it gives a useful evaquation way directly to an individual household in apartment when they failed to evacuate through the entrance door. HEE may offer an opportunity to optain two way egress path ways instead of evacuation space at balcony and through path way to adjacent household in building and that might be an big strengh. but it needs to guarantee for against the crime, getting detailed reviews for being security and supplementation of fire test methods.

  • PDF

One room Residential Dweller's Housing Behavior and Housing Need (원룸주택거주자의 주거행태와 요구도)

  • 황기아;백미나
    • Korean Journal of Human Ecology
    • /
    • v.7 no.1
    • /
    • pp.81-99
    • /
    • 2004
  • This study examined one room(studio apartment) residential deweller's housing behavior and housing need, and the relationship between the sense of housing values and housing satisfaction of one-room residence, The study surveyed 302 one-room residents in Busan city. The researcher modified, complimented, and used the previous researches on housing values and housing satisfaction. The analysis of the data used SPSS Win 10.0 program. The results of the research can be summarized as follows: 1. The motive of choosing one-room residence was mainly the closeness to the school or work, Jeonse(Rent with a one-room deposit) was more common than ownership, and the size is one-room residence was 10 to 15 Pyeong. 2. Among the five housing values of one-room residence dwellers, that is, amenity, indoor and outdoor environment, economy/convenience, convenience in transportation, and the interior functionality, the convenience in transportation was ranked highest, and the indoor and out door environment and economy/convenience followed. 3. The housing satisfaction of one-room residents was highest in location, and also high in the safety and the security or privacy, and the convenience of inside facility.

  • PDF

Simple Calculation Method as a Supplementary Radiation Safety Assessment for Facility with Radiation Generator

  • Kim, Sang-Tae
    • International Journal of Contents
    • /
    • v.14 no.4
    • /
    • pp.65-69
    • /
    • 2018
  • The objective of this study was to conduct a radiation shielding analysis for the facility equipped with radiation generator. The analysis was carried out in two aspects. First, from the aspect of the effect caused by primary and leakage radiation. Second, effect of scattered radiation was evaluated by applying a simple calculation method based on a scattering rate concept since effect of scattered radiation is significantly important at maze entrance of the radiation facility. The calculated results obtained using the simple method were compared to the results calculated using Geant4 code and the measured values. The results calculated by the suggested method indicate that slight error exists in a radiation shielding analysis done at the maze entrance comparing to other two results, while the results evaluated at the outside of the maze entrance door are relatively consistent with other values.