• Title/Summary/Keyword: Home Security

Search Result 730, Processing Time 0.023 seconds

Application of Threat Modeling for Security Risk Analysis in Smart Home Service Environment (스마트홈 서비스 환경에서의 보안 위험 분석을 위한 위협 모델링 적용 방안)

  • Lee, Yun-Hwan;Park, Sang-Gun
    • The Transactions of the Korean Institute of Electrical Engineers P
    • /
    • v.66 no.2
    • /
    • pp.76-81
    • /
    • 2017
  • In this paper, the risk analysis of smart home services was implemented by applying threat modeling. Identified possible threats for safe deployment of smart home services and identified threats through the STRIDE model. Through the creation of the Attack Tree, the attackable risk was analyzed and the risk was measured by applying the DREAD model. The derived results can be used to protect assets and mitigate risk by preventing security vulnerabilities from compromising and identifying threats from adversely affecting services. In addition, the modeled result of the derived threat can be utilized as a basis for performing the security check of the smart home service.

The Authentication Framework in Access Network based on Home Gateway (홈 게이트웨이에 기반한 가입자망에서의 인증 프레임워크)

  • Yoon Hwa-Mook;Choi Byung-Sun;Lee Seoung-Hyeon;Lee Jae-Kwang;Lee Won-Goo
    • The Journal of the Korea Contents Association
    • /
    • v.5 no.4
    • /
    • pp.160-168
    • /
    • 2005
  • Today, home networking security shows the complicated and various characteristics of requirements for consideration because of the variety of information appliances and share of resources among them. Therefore, security framework to satisfy with security functions is arranged ,regardless of the variety of communication medium and protocols. Thus, we construct security framework for mobile host(or user) to securely control devices in home-network through the variety of suggested mechanism, with security mechanism to be available for future home networking model, and verified the performance of our model.

  • PDF

Design and Implementation of Arduino-based Efficient Home Security Monitoring System (아두이노 기반의 효율적인 홈 시큐리티 모니터링 시스템 설계 및 구현)

  • Lee, Hyoung-Ro;Lin, Chi-Ho
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.16 no.2
    • /
    • pp.49-54
    • /
    • 2016
  • In this paper, we propose an Arduino-based effective home security monitoring system. Proposed home security monitoring system consists of arduino which is inexpensive main processor, ultrasonic sensor and human body detection sensor to detect whether someone breaks into home. Data from ultrasonic sensor and human body detection sensor are transmitted to web server via ethernet shield connected to arduino. Web server checks whether someone breaks into home by using stored data from ultrasonic sensor and human body detection sensor. Snapshot is photographed via webcam connected by using JQuery. Photographed snapshot is stored in web server as image file. A user can monitor in web or smart device environment by using HTML5, CSS and Canvas. When examining efficiency of proposed home security monitoring system, it was found that proposed system is easier to be made than existing home security system and is cost effective by using arduino and is efficient and convenient and stable as it enables a user to handle an error in person and it uses reliable data.

Generative Fathering and Toddler Attachment Security (생산적인 아버지노릇과 유아의 애착안정성)

  • Yee Young-Hwan
    • Journal of the Korean Home Economics Association
    • /
    • v.37 no.12 s.142
    • /
    • pp.91-102
    • /
    • 1999
  • The purpose of this study was to investigate the father-child relationship. The final sample for the data analyses included 83 three-year old children and their lathers. The instrument of study was the 'generative fathering'(by Yee et al, 1999). This measurement consisted two areas, first is the father's involvement in child rearing, and second is the responsibility on child rearing. And the child attachment security was observed through Attachment Q-Set(Waters, 1987) in the child's home. The results were following: 1. The mean of the child's attachment security was .33 and the range of attachment security was from -.07 to .79. 2. Father had higher responsibility on rearing, more involved in the child care. 3. The child's attachment security was predicted by the father's involvement in rearing. The father's responsibility didn't show the relationship with the child's attachment security. Especially among the subcategories of involvement, the activity with child had a significant relation to attachment security. So the father's interaction with child was meaningful for the child to develop the internal working model.

  • PDF

Security Policy Framework for Home Network (홈 네트워크 보안 정책 프레임워크)

  • Kim, Geon-Woo;Kim, Do-Woo;Lee, Jun-Ho;Han, Jong-Wook
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • v.9 no.1
    • /
    • pp.839-842
    • /
    • 2005
  • As various mobile technologies, sensor technologies, and remote control technologies are growing and quality of life is enhanced, researches and developments on home network are actively on going. Currently, some network service providers and construction corporations are going to provide home network service, but neither secure nor efficient, So, in this paper, we propose a security framework for providing various secure user authentication mechanisms and efficiently controlling services in home network. Namely, we are going to provide active home network security services with home gateway-based security policy, which locates on the gateway of each home.

  • PDF

Device Mutual Authentication and Key Management Techniques in a Smart Home Environment (스마트 홈 환경에서 디바이스 상호 인증 및 키 관리 기법)

  • Min, So-Yeon;Lee, Jae-Seung
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.19 no.10
    • /
    • pp.661-667
    • /
    • 2018
  • Recently, the smart home market is growing due to the development of wireless communication technology and sensor devices, and various devices are being utilized. Such an IoT environment collects various vast amount of device information for intelligent services, receives services based on user information, controls various devices, and provides communication between different types of devices. However, with this growth, various security threats are occurring in the smart home environment. In fact, Proofpoint and HP warned about the cases of damage in a smart home environment and the severity of security vulnerabilities, and cases of infringement in various environments were announced. Therefore, in this paper, we have studied secure mutual authentication method between smart nodes used in smart home to solve security problems that may occur in smart home environment. In the case of the proposed thesis, security evaluations are performed using random numbers and frequently updated session keys and secret keys for well-known vulnerabilities that can occur in IoT environments and sensor devices such as sniffing, spoofing, device mutual authentication, And safety. In addition, it is confirmed that it is superior in security and key management through comparison with existing smart home security protocol.

Cloud security authentication platform design to prevent user authority theft and abnormal operation during remote control of smart home Internet of Things (IoT) devices (스마트 홈 사물인터넷 기기(IoT)의 원격제어 시 사용자 권한 탈취 및 이상조작 방지를 위한 클라우드 보안인증 플랫폼 설계)

  • Yoo Young Hwan
    • Convergence Security Journal
    • /
    • v.22 no.4
    • /
    • pp.99-107
    • /
    • 2022
  • The use of smart home appliances and Internet of Things (IoT) devices is growing, enabling new interactions and automation in the home. This technology relies heavily on mobile services which leaves it vulnerable to the increasing threat of hacking, identity theft, information leakage, serious infringement of personal privacy, abnormal access, and erroneous operation. Confirming or proving such security breaches have occurred is also currently insufficient. Furthermore, due to the restricted nature of IoT devices, such as their specifications and operating environments, it is difficult to provide the same level of internet security as personal computers. Therefore, to increase the security on smart home IoT devices, attention is needed on (1) preventing hacking and user authority theft; (2) disabling abnormal manipulation; and (3) strengthening audit records for device operation. In response to this, we present a plan to build a cloud security authentication platform which features security authentication management functionality between mobile terminals and IoT devices.

A Study on Living Space with the Internet Information Appliances (인터넷 정보가전을 활용한 주거공간 연구)

  • 전흥수;김주연
    • Korean Institute of Interior Design Journal
    • /
    • no.28
    • /
    • pp.44-50
    • /
    • 2001
  • This study propose the new concept of residence by analyzing the change of residence through the characteristic of popularity and degree of development of technology on home network information appliance for intelligent home. Accordingly, Cyber village represented as home automation and extend to information of society. it encourage need of information and multimedia of home. It expect home information infrastructure for accepting informations, which make smart home to linked home-working home-learning home-treatment. home-shopping and home-banking. The system of intelligent home is the intelligence of human-biology in the side of environmental friendly and multi-function. it distinguish the system of security, controlling system of inside environment, supporting system of house-working, automatic controlling, house working. Future house require to meet demand of young generation, such as small residental space, the multi-functional space, the flexible space, making mood for dual income couple and of single as intelligent home. Accordingly, basic purpose which are pleasantness, the safe and the convenience the mobile multi-function as well as networking with controlling of temperature, security, health-test, home-entertainment, home-office and consider environment together.

  • PDF

CNN Based 2D and 2.5D Face Recognition For Home Security System (홈보안 시스템을 위한 CNN 기반 2D와 2.5D 얼굴 인식)

  • MaYing, MaYing;Kim, Kang-Chul
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.14 no.6
    • /
    • pp.1207-1214
    • /
    • 2019
  • Technologies of the 4th industrial revolution have been unknowingly seeping into our lives. Many IoT based home security systems are using the convolutional neural network(CNN) as good biometrics to recognize a face and protect home and family from intruders since CNN has demonstrated its excellent ability in image recognition. In this paper, three layouts of CNN for 2D and 2.5D image of small dataset with various input image size and filter size are explored. The simulation results show that the layout of CNN with 50*50 input size of 2.5D image, 2 convolution and max pooling layer, and 3*3 filter size for small dataset of 2.5D image is optimal for a home security system with recognition accuracy of 0.966. In addition, the longest CPU time consumption for one input image is 0.057S. The proposed layout of CNN for a face recognition is suitable to control the actuators in the home security system because a home security system requires good face recognition and short recognition time.

The relationship between Mother′s Warmth, Control and Toddler′s Attachment Security (어머니의 온정 및 통제와 유아의 애착 안정성간의 관계)

  • 이진숙
    • Journal of the Korean Home Economics Association
    • /
    • v.39 no.6
    • /
    • pp.41-50
    • /
    • 2001
  • The purpose of this study was to investigate the relationship between mother's warmth, control and toddler's attachment security. Subjects were 83 three-year old children and their mothers in Jeonju city. The intruments of this study were the Parenting Style Scale(Cho et at.,1999) and Attachment Q-set(AQS; Waters,1987). Mothers rated the questionnaire and observed a child through AQS at home. The results showed that the mean of the child attachment security was .39 and the range of attachment score was from -0.07 to 0.79. The scores of mothers' warmth and control were above the mean. The child's attachment security was predicted by mother's warmth. Mother's warmth appeared to be meaningful for child to develop the secure attachment. The result of this study suggested that authoritative parenting characterized with warmth and control was significantly associated with the child's attachment security.

  • PDF