• Title/Summary/Keyword: Embedded device

Search Result 889, Processing Time 0.022 seconds

Side-Channel Attacks on Square Always Exponentiation Algorithm (Square Always 멱승 알고리듬에 대한 부채널 공격)

  • Jung, Seung-Gyo;Ha, Jae-Cheol
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.24 no.3
    • /
    • pp.477-489
    • /
    • 2014
  • Based on some flaws occurred for implementing a public key cryptosystem in the embedded security device, many side-channel attacks to extract the secret private key have been tried. In spite of the fact that the cryptographic exponentiation is basically composed of a sequence of multiplications and squarings, a new Square Always exponentiation algorithm was recently presented as a countermeasure against side-channel attacks based on trading multiplications for squarings. In this paper, we propose Known Power Collision Analysis and modified Doubling attacks to break the Right-to-Left Square Always exponentiation algorithm which is known resistant to the existing side-channel attacks. And we also present a Collision-based Combined Attack which is a combinational method of fault attack and power collision analysis. Furthermore, we verify that the Square Always algorithm is vulnerable to the proposed side-channel attacks using computer simulation.

Modified MQTT-SN Protocol for End-to-End Security in a Constrained Embedded Environment (자원제약적 임베디드 환경에서 종단간 보안을 지원하는 수정된 MQTT-SN)

  • Nam, Hye-min;Park, Chang-seop
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.30 no.5
    • /
    • pp.859-870
    • /
    • 2020
  • The MQTT-SN (Message Queuing Telemetry Transport-Sensor Network) protocol is a message transmission protocol used in a sensor-based Internet of Things (IoT) environment. This MQTT-SN protocol is a publish-subscribe model with a broker in the middle of message transmission, and each IoT device sends and receives messages through an intermediary when delivering messages. However, the MQTT-SN protocol does not provide security-related functions such as message security, mutual authentication, access control, and broker security. Accordingly, various security problems have recently occurred, and a situation in which security is required has emerged. In this paper, we review the security requirements of MQTT-SN once again, and propose a modified protocol that improves security while satisfying the constraints in the environment where the resource of IoT to which this protocol is applied is limited. Unlike the existing protocol, the security field and authentication server have been added to satisfy the security requirements. In addition, the proposed protocol is actually implemented and tested, and the proposed protocol is evaluated for practical use in terms of energy consumption.

Implementation and Experiment for Search Performance Analysis of SQLite Mobile Database (SQLite 모바일 데이터베이스의 검색 성능 분석을 위한 구현 및 실험)

  • Choi, Jin-oh
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.21 no.2
    • /
    • pp.333-338
    • /
    • 2017
  • Recently, because of the mobile device generalization tendency, a lot of new mobile applications which need mobile database on mobile devices appear. SQLite, Realm, etc. are representative mobile databases, and they are the database engines which are suitable for small devices that have large resource restriction and are used a lot in mobile devices based on Linux. These engines are open source programs and have advantages which are lighter weight and faster speed than general purpose databases. This paper focuses on the performance experiments and analysis of SQLite, which is front runner in mobile database fields. Considering the target mobile environments, the test is performed at Linux environment. And this paper implements performance test program and performs performance experiment of SQLite database to test search efficiency. The experiment is processed by comparison with the results of a Oracle database working out at the same environment.

Study on Visual Recognition Enhancement of Yellow Carpet Placed at Near Pedestrian Crossing Areas : Visual Attention Software Implementation (횡단보도 옐로카펫 설치에 따른 시인성 증진효과 연구 : Visual Attention Software 분석 중심으로)

  • Ahn, Hyo-Sub;Kim, Jin-Tae
    • Journal of Information Technology Services
    • /
    • v.15 no.4
    • /
    • pp.73-83
    • /
    • 2016
  • Pedestrian safety was recently highlighted with a yellow carpet, a yellow-colored pavement material prepared for children waiting for signals for pedestrian crossing, without validation of its efficiency in practice. It was a promising device likely to assist highway safety by stimulating pedestrian to step on the yellow-colored area; it was generally called nudge effects. This paper delivers a study conducted to check the effectiveness of yellow carpet in three different aspects in vehicle driver's perspective by applying the newly introduced information technology (IT) service: Visual Attention Software (VAS). It was assumed that VAS developed by 3M in the United States should be able explain the Korean drivers' visual reaction behaviors since technology embedded in VAS was developed based on and proved by other various international countries and continents in the world. A set of pictures was taken at thirteen different field sites in seven school zone areas in the Seoul metropolitan area before and after the installation of a yellow carpet, respectively. Sets of those pictures were analyzed with VAS, and the results were compared based on the selective safety measures: the likely focusing on standing pedestrians (waiting for a pedestrian's green signal time) affected by its background (yellow-colored pavement) contrasting him or her. The test results from a set of before-and-after comparison analyses showed that the placement of yellow carpet would (1) increase 71% of driver's visual attention on pedestrian crossing areas and (2) change the sequential order of visual attention on that area 2.4 steps ahead. The findings would enhance deployment of such promising efficiency and thus increase children safety in pedestrian crossing. The result was promising to highlight the way to support the changes in conservative traffic safety engineering field by applying the advanced IT services, while much robust research was recommended to overcome the limitation of simplification of this study.

A Study on Secure Key Backup/Recovery Scheme for Device based on Mobile Trusted Module (Mobile Trusted Module 기반 단말에서의 안전한 키 백업 및 복구 방안에 대한 연구)

  • Kang, Dong-Wan;Jun, Sung-Ik;Lee, Im-Yeoung
    • The KIPS Transactions:PartC
    • /
    • v.16C no.3
    • /
    • pp.335-346
    • /
    • 2009
  • Mobile environments are evolving the main communication environment as a develops of communication technology. In mobile environments, sensitive information can be compromised on-line, so demand for security has increased. Also, mobile devices that provide various services are in danger from malware and illegal devices, phishing and sniffing etc, and the privacy. Therefore, MTM(Mobile Trusted Module) is developed and promoted by TCG(Trusted Computing Group), which is an industry standard body to enhance the security level in the mobile computing environment. MTM protects user privacy and platform integrity, because it is embedded in the platform, and it is physically secure. However, a security approach is required when secret data is migrated elsewhere, because MTM provides strong security functions. In this paper, we analyze the TCG standard and migration method for cryptographic key, then we propose a secure migration scheme for cryptographic key using key Backup/Recovery method.

Why Do Consumers Resist Innovative Wearable Devices? The Case of Smartwatches (사용자 선호기반 웨어러블 디바이스의 수용성 연구: 스마트워치를 중심으로)

  • Kim, Minseok;Kim, Wonjoon;Kim, Minki;Kang, Jae Won
    • The Journal of the Korea Contents Association
    • /
    • v.17 no.9
    • /
    • pp.523-535
    • /
    • 2017
  • Despite consumers' increasing awareness and interests in innovative wearable devices, the sales growth has been stagnant. To analyze this phenomenon, we investigate consumer preferences for various innovative features embedded in wearable devices. Conducting conjoint analysis on smartwatches, we empirically show that the curse of innovation can occur when the consumer's expected utility from the smartwatch falls short of his/her psychological cost associated with behavior change from smartwatch usage. Therefore, our findings provide managerial implications on the R&D strategy for new technologies and more importantly on the marketing strategy easing consumers' resistance to highly innovative products.

Wafer-Level Fabrication of a Two-Axis Micromirror Driven by the Vertical Comb Drive (웨이퍼 레벨 공정이 가능한 2축 수직 콤 구동 방식 마이크로미러)

  • Kim, Min-Soo;Yoo, Byung-Wook;Jin, Joo-Young;Jeon, Jin-A;Park, Il-Heung;Park, Jae-Hyoung;Kim, Yong-Kweon
    • Proceedings of the KIEE Conference
    • /
    • 2007.11a
    • /
    • pp.148-149
    • /
    • 2007
  • We present the design and fabrication prcoess of a two-axis tilting micromirror device driven by the electrostatic vertical comb actuator. A high aspect-ratio comb actuator is fabricated by multiple DRIE process in order to achieve large scan angle. The proposed fabrication process enables a mirror to be fabricated on the wafer-scale. By bonding a double-side polished (DSP) wafer and a silicon-on-insulator (SOI) wafer together, all actuators on the wafer are completely hidden under the reflectors. Nickel lines are embedded on a Pyrex wafer for the electrical access to numerous electrodes of mirrors. An anodic bonding step is implemented to contact electrical lines with ail electrodes on the wafer at a time. The mechanical angle of a fabricated mirror has been measured to be 1.9 degree and 1.6 degree, respectively, in the two orthogonal axes under driving voltages of 100 V. Also, a $8{\times}8$ array of micromirrors with high fill-factor of 70 % is fabricated by the same fabrication process.

  • PDF

A Study on Long Range Image Monitoring and Tracking System Using Laser Range-Gate Method in Inclement Weather Conditions (악천후 상황에서 Laser Range-Gate 방식을 이용한 원거리 영상 감시 및 추적 시스템에 대한 연구)

  • Oh, Sung-Kwun;Yoo, Sung-Hoon;Ku, Kyong-Wan;Kim, Su-Chan
    • The Transactions of The Korean Institute of Electrical Engineers
    • /
    • v.62 no.2
    • /
    • pp.257-263
    • /
    • 2013
  • In case of image observation equipments, CCTV for short distance visual field is usually installed and operated mostly as the means of crime-prevention. However, the extensive demand for monitoring problems in case of the increase in intelligent crimes and disasters has led to the necessity of the development of long-distance observation equipments embedded with Night View functions. In case of the Night View equipments, the relevant market is set up to be focused mostly on Thermal Observation Device(hereinafter, TOD), but some shortcomings such as the limitation of image visibility and excessive maintenance cost, etc. have actually caused the necessity of new long distance Night View equipment. Moreover there might follow lots of difficulties in long-distance visualization in the event that irregular reflection is generated by minute particles in the atmosphere such as fog, smog, and dust, etc. These factors are motivate the work presented in this study. Our study is aimed at the realization of Pulsed Laser Illuminator and newly proposed Range-Gated image acquisition technology. And also the implementation of Tracker for continuous trace of the objects of interest from the obtained sequence images.

Event based Rule Processing in Ubiquitous Web Services Environments (유비쿼터스 웹서비스 환경에서 이벤트 기반의 룰 처리 기법)

  • Lee Kang-Chan;Lee Won-Suk;Jeon Jong-Hong;Lee Seung-Yun;Park Jong-Hun
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.10 no.6
    • /
    • pp.1101-1105
    • /
    • 2006
  • Ubiquitous computing network comprises a variety of distributed service devices. Today Web services technology enables the heterogeneous devices to provide their own services and interact with each other via well-defined Internet protocol. Nevertheless, service devices in ubiquitous environments require more event-driven, autonomous interaction beyond rather passive service-oriented architecture of the present time. This paper presents an ECA (Event-Condition-Action) rule description language in an attempt to support capability for autonomous interactions among service-oriented devices in ubiquitous computing network. Specifically, the proposed WS-ECA is an XML-based ECA rule description language for web service-enabled devices. The rules are embedded in distributed devices which invoke appropriate services in the network if the rules are triggered by some internal or external events. The presented ECA-based device coordination approach is expected to facilitate seamless inter-operation among the web service-enabled devices in the emerging ubiquitous computing environment.

Search Performance Improvement of Column-oriented Flash Storages using Segmented Compression Index (분할된 압축 인덱스를 이용한 컬럼-지향 플래시 스토리지의 검색 성능 개선)

  • Byun, Siwoo
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.14 no.1
    • /
    • pp.393-401
    • /
    • 2013
  • Most traditional databases exploit record-oriented storage model where the attributes of a record are placed contiguously in hard disk to achieve high performance writes. However, for search-mostly datawarehouse systems, column-oriented storage has become a proper model because of its superior read performance. Today, flash memory is largely recognized as the preferred storage media for high-speed database systems. In this paper, we introduce fast column-oriented database model and then propose a new column-aware index management scheme for the high-speed column-oriented datawarehouse system. Our index management scheme which is based on enhanced $B^+$-Tree achieves high search performance by embedded flash index and unused space compression in internal and leaf nodes. Based on the results of the performance evaluation, we conclude that our index management scheme outperforms the traditional scheme in the respect of the search throughput and response time.