• Title/Summary/Keyword: Implementation verification

Search Result 689, Processing Time 0.027 seconds

Trustworthy Smart Band: Security Requirements Analysis with Threat Modeling (위협 모델링을 통한 스마트밴드 보안 요구사항 분석)

  • Kang, Suin;Kim, Hye Min;Kim, Huy Kang
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.28 no.6
    • /
    • pp.1355-1369
    • /
    • 2018
  • As smart bands make life more convenient and provide a positive lifestyle, many people are now using them. Since smart bands deal with private information, security design and implementation for smart band system become necessary. To make a trustworthy smart band, we must derive the security requirements of the system first, and then design the system satisfying the security requirements. In this paper, we apply threat modeling techniques such as Data Flow Diagram, STRIDE, and Attack Tree to the smart band system to identify threats and derive security requirements accordingly. Through threat modeling, we found the vulnerabilities of the smart band system and successfully exploited smart bands with them. To defend against these threats, we propose security measures and verify that they are secure by using Scyther which is a tool for automatic verification of security protocol.

Priority for the Investment of Artificial Rainfall Fusion Technology (인공강우 융합기술 개발을 위한 R&D 투자 우선순위 도출)

  • Lim, Jong Yeon;Kim, KwangHoon;Won, DongKyu;Yeo, Woon-Dong
    • The Journal of the Korea Contents Association
    • /
    • v.19 no.3
    • /
    • pp.261-274
    • /
    • 2019
  • This paper aims to develop an appropriate methodology for establishing an investment strategy for 'demonstration of artificial rainfall technology using UAV' and that include establishment of a technology classification, set of indicators for technology evaluation, suggestion of final key technology as a whole study area. It is designed to complement the latest research trend analysis results and expert committee opinions using quantitative analysis. The key indicators for technology evaluation consisted of three major items (activity, technology, marketability) and 10 detailed indicators. The AHP questionnaire was conducted to analyze the importance of indicators. As a result, it was analyzed that the attribute of the technology itself is most important, and the order of closeness to the implementation of the core function (centrality), feasibility (feasibility). Among the 16 technology groups, top investment priority groups were analyzed as ground seeding, artificial rainfall verification, spreading and diffusion of seeding material, artificial rainfall numerical modeling, and UAV sensor technology.

A Study on Development of Electronic Performance Support System Prototype for Improving the Efficiency of Quality Inspection of Temporary Work (가설공사 품질점검 업무효율 향상을 위한 전자작업지원시스템(EPSS) 프로토타입 개발에 관한 연구)

  • Yoon, Soo-Ho;Choi, Chang-Hoon;Han, Choong-Hee;Lee, Junbok
    • Korean Journal of Construction Engineering and Management
    • /
    • v.20 no.2
    • /
    • pp.13-27
    • /
    • 2019
  • While temporary construction work applies to a temporary facility, it has a high use frequency during the construction period accounting for around 10% of the construction cost, it requires systematic management. However, construction inspection information of temporary construction work often has no special specification in the design documents and specification items, with the items on various standards also being formidable. Because of this, related inspection are likely to be performed inefficiently with a high probability for occurrence of human errors when quality inspection is conducted for the temporary construction work. In the present study, therefore, apply to the electronic operation support system capable of supporting implementation of inspection of providing related information for the contemporary construction work. To achieve this, a prototype is developed by using IDEF0 to identify information flow by process and organizing EPSS-based quality inspection Task. And then, efficiency of the quality inspection and information accessibility for temporary construction work are to be improved by verification method of Sample Project.

The Effect of Contents Information Quality of u-Tourism Information System on Flow Theory and Satisfaction - Focusing on tourists who visited Namhansanseong - (u-관광정보시스템의 콘텐츠 정보품질이 플로우이론과 만족에 미치는 영향 -남한산성을 찾은 관광객을 중심으로-)

  • Sun, Su-Kyun
    • Journal of Digital Convergence
    • /
    • v.17 no.4
    • /
    • pp.137-147
    • /
    • 2019
  • This paper studies the effect of content information quality of u-tourism information system on flow theory and satisfaction. The purpose of the research is to generate and propose flow-related information to satisfy tourists with content information quality. The meaning of this paper is to derive success factors for verifying satisfaction of content information quality to tourists, establish hypotheses as research models, and evaluate verification. The differentiation of this study is the design implementation of u-fusion tourism information system by combining flow relation information with flow theory. The contribution of this paper is the generation of flow related information and the elicitation of success factors of contents quality of u-tourism information system. The advantage is that tourists can be patterned by symbolization and the pattern can be illustrated. The limitations of this paper are limited to small areas, and the lack of objectivity is required and future tasks are needed to compensate for them.

Design of AES-Based Encryption Chip for IoT Security (IoT 보안을 위한 AES 기반의 암호화칩 설계)

  • Kang, Min-Sup
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.21 no.1
    • /
    • pp.1-6
    • /
    • 2021
  • The paper proposes the design of AES-based encryption chip for IoT security. ROM based S-Box implementation occurs a number of memory space and some delay problems for its access. In this approach, S-Box is designed by pipeline structure on composite field GF((22)2) to get faster calculation results. In addition, in order to achieve both higher throughput and less delay, shared S-Box are used in each round transformation and the key scheduling process. The proposed AES crypto-processor is described in Veilog-HDL, and Xilinx ISE 14.7 tool is used for logic synthesis by using Xilinx XC6VLX75T FPGA. In order to perform the verification of the crypto-processor, the timing simulator(ModelSim 10.3) is also used.

Montgomery Multiplier Supporting Dual-Field Modular Multiplication (듀얼 필드 모듈러 곱셈을 지원하는 몽고메리 곱셈기)

  • Kim, Dong-Seong;Shin, Kyung-Wook
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.24 no.6
    • /
    • pp.736-743
    • /
    • 2020
  • Modular multiplication is one of the most important arithmetic operations in public-key cryptography such as elliptic curve cryptography (ECC) and RSA, and the performance of modular multiplier is a key factor influencing the performance of public-key cryptographic hardware. An efficient hardware implementation of word-based Montgomery modular multiplication algorithm is described in this paper. Our modular multiplier was designed to support eleven field sizes for prime field GF(p) and binary field GF(2k) as defined by SEC2 standard for ECC, making it suitable for lightweight hardware implementations of ECC processors. The proposed architecture employs pipeline scheme between the partial product generation and addition operation and the modular reduction operation to reduce the clock cycles required to compute modular multiplication by 50%. The hardware operation of our modular multiplier was demonstrated by FPGA verification. When synthesized with a 65-nm CMOS cell library, it was realized with 33,635 gate equivalents, and the maximum operating clock frequency was estimated at 147 MHz.

A Case Study on MIL-STD-1760E based Test Bench Implementation for Aircraft-Weapon Interface Testing (항공기-무장간의 연동 시험을 위한 MIL-STD-1760E 기반 테스트 벤치 구축 사례 연구)

  • Kim, Tae-bok;Park, Ki-seok;Kim, Ji-hoon;Jung, Jae-won;Kwon, Byung-gi
    • Journal of Advanced Navigation Technology
    • /
    • v.22 no.2
    • /
    • pp.57-63
    • /
    • 2018
  • In the case of aircraft-launched guided weapons, various interface tests such as MIL-STD-1760 based power source, discrete signal, MUX communication as well as BIT of missile can verify system safety and reliability. The purpose of this case study is to develop a test bench based on MIL-STD-1760E for interoperability testing between aircraft and weapons. We proposed a testing method of the launch sequence based on the defined TIME LINE in the development phase of the missile system from the application of the power of the missile to the targeting, the transfer order, and the missile separation process. Furthermore, it will be a reference model that can maximize the verification scope in the development phase of the air to surface missile system by simulating abnormal situation to the inert missile using the error insertion function.

Hardware Implementation of the Fuzzy Fingerprint Vault System (지문 퍼지볼트 시스템의 하드웨어 구현)

  • Lim, Sung-Jin;Chae, Seung-Hoon;Pan, Sung-Bum
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.20 no.2
    • /
    • pp.15-21
    • /
    • 2010
  • The user authentication using fingerprint information not only provides the convenience but also high security. However, the fingerprint information for user authentication can cause serious problems when it has been compromised. It cannot change like passwords, because the user only has ten fingers on two hands. Recently, there is an increasing research of the fuzzy fingerprint vault system to protect fingerprint information. The research on the problem of fingerprint alignment using geometric hashing technique carried out. This paper proposes the hardware architecture fuzzy fingerprint vault system based on geometric hashing. The proposed architecture consists of software and hardware module. The hardware module has charge of matching between enrollment hash table and verification hash table. Based on the experimental results, the execution time of the proposed system with 36 real minutiae is 0.2 second when 100 chaff minutiae, 0.53 second when 400 chaff minutiae.

Design Implementation of Lightweight and High Speed Security Protocol Suitable for UHF Passive RFID Systems (UHF 수동형 RFID 시스템에 적합한 경량 고속의 보안 프로토콜 설계 및 구현)

  • Kang, You-Sung;Choi, Yong-Je;Choi, Doo-Ho;Lee, Sang-Yeoun;Lee, Heyung-Sup
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.20 no.4
    • /
    • pp.117-134
    • /
    • 2010
  • A passive RFID tag which received attention as a future technology for automatic and quick identification faces some difficulties about security problems such as tag authentication, reader authentication, data protection, and untraceability in addition to cost and reliable identification. A representative passive RFID technology is the ISO/IEC 18000-6 Type C which is an international standard for 900 MHz UHF-band. This standard has some difficulties in applying to the security services such as originality verification, tag's internal information protection, and untraceability, because it does not provide high-level security solution. In this paper, we summarize security requirements of ISO/IEC ITC 1/SC 31 international standardization group, propose security protocols suitable for the UHF-band passive RFID system using a crypto engine, and analyze its security strength. In addition, we verify that it is possible to implement a tag conforming with the proposed security protocols by presenting concrete command/response pairs and cryptographic method.

Implementation of an Electrode Positioning System to Improve the Accuracy and Reliability of the Secondary Battery Stacking Process (2차 전지 적층 공정의 정확성과 신뢰성 향상을 위한 전극 위치결정 시스템 구현)

  • Lee, June-Hwan
    • Journal of Convergence for Information Technology
    • /
    • v.11 no.6
    • /
    • pp.219-225
    • /
    • 2021
  • As for the battery package method, a prismatic package method is preferred for stability reasons, but it is rapidly expanding due to the stability verification of a pouch type package. The pouch type using the lamination process has an advantage of high battery energy density because it can reduce space waste, but has a disadvantage of low productivity. Therefore, in this paper, by extracting edge detection algorithm precision, pattern algorithm precision, and motion controller recall rate by improving backlight lighting fixtures to minimize light diffusion, securing standards for stereo camera position relationship displacement monitoring, and securing standards for lens release monitoring. We propose to implement a system that ensures accuracy and reliability in positioning. As a result of the experiment, the proposed system shows an average error range of 0.032mm for edge detection, 0.02mm for pattern algorithm, and 0.014mm for motion controller, thus ensuring the accuracy and reliability of the positioning mechanism.