• Title/Summary/Keyword: Intelligent security

Search Result 703, Processing Time 0.025 seconds

An Efficient Anonymous Authentication Scheme with Secure Communication in Intelligent Vehicular Ad-hoc Networks

  • Zhang, Xiaojun;Mu, Liming;Zhao, Jie;Xu, Chunxiang
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.13 no.6
    • /
    • pp.3280-3298
    • /
    • 2019
  • Vehicular ad-hoc networks (VANETs) have become increasingly significant in intelligent transportation systems, they play a great role in improving traffic safety and efficiency. In the deployment of intelligent VANETs, intelligent vehicles can efficiently exchange important or urgent traffic information and make driving decisions. Meanwhile, secure data communication and vehicle's identity privacy have been highlighted. To cope with these security issues, in this paper, we construct an efficient anonymous authentication scheme with secure communication in intelligent VANETs. Combing the ElGamal encryption technique with a modified Schnorr signature technique, the proposed scheme provides secure anonymous authentication process for encrypted message in the vehicle-to-infrastructure communication model, and achieves identity privacy, forward security, and reply attack resistance simultaneously. Moreover, except the trusted authority (TA), any outside entity cannot trace the real identity of an intelligent vehicle. The proposed scheme is designed on an identity-based system, which can remove the costs of establishing public key infrastructure (PKI) and certificates management. Compared with existing authentication schemes, the proposed scheme is much more practical in intelligent VANETs.

Emergency Detection Method using Motion History Image for a Video-based Intelligent Security System

  • Lee, Jun;Lee, Se-Jong;Park, Jeong-Sik;Seo, Yong-Ho
    • International journal of advanced smart convergence
    • /
    • v.1 no.2
    • /
    • pp.39-42
    • /
    • 2012
  • This paper proposed a method that detects emergency situations in a video stream using MHI (Motion History Image) and template matching for a video-based intelligent security system. The proposed method creates a MHI of each human object through image processing technique such as background removing based on GMM (Gaussian Mixture Model), labeling and accumulating the foreground images, then the obtained MHI is compared with the existing MHI templates for detecting an emergency situation. To evaluate the proposed emergency detection method, a set of experiments on the dataset of video clips captured from a security camera has been conducted. And we successfully detected emergency situations using the proposed method. In addition, the implemented system also provides MMS (Multimedia Message Service) so that a security manager can deal with the emergency situation appropriately.

A Study of Authentication Scheme based on Personal Key for Safety Intelligent Vehicle (안전한 지능형 자동차를 위한 개인키 기반의 인증 기법에 관한 연구)

  • Lee, Keun-Ho
    • Journal of Digital Convergence
    • /
    • v.12 no.2
    • /
    • pp.549-554
    • /
    • 2014
  • Studies on the intelligent vehicles that are converged with IT and vehicular technologies are currently under active discussion. A variety of communication technologies for safety intelligent vehicle services are support. As such intelligent vehicles use communication technologies, they are exposed to the diverse factors of security threats. To conduct intelligent vehicle security authentication solutions, there are some factors that can be adopted ownership, knowledge and biometrics[6,7]. This paper proposes to analyze the factors to threaten intelligent vehicle, which are usually intruded through communication network system and the security solution using biometric authentication scheme. This study proposed above user's biometrics information-based authentication scheme that can solve the anticipated problems with an intelligent vehicle, which requires a higher level of security than existing authentication solution.

Development Plan of Safety Management on Intelligent Robot (지능형 로봇에 대한 안전관리 발전방안)

  • Ju, Il-Yeop
    • Korean Security Journal
    • /
    • no.26
    • /
    • pp.89-119
    • /
    • 2011
  • The purpose of this study is to progress the development plan of safety management on the intelligent robot through safety analysis on the intelligent robot, major present condition of safety management on the intelligent robot, enforcement method of safety management on the intelligent robot. The following is the result of the study. First, we have to establish the provision or the special legislation to regulate the safety management of the intelligent robot substantially in the intelligent robot development and supply promotion law, the enforcement ordinance, the enforcement regulation. And, we should propel to establish the provision on the safety management of the intelligent robot in the laws related on ethics and safety. Second, we should establish the Robot Ethical Charter through the national and international agreement to give a guarantee against the safety management of the intelligent robot. Furthermore, we have to induces people's interest on the safety management of the intelligent robot through offering the public information of the Robot Ethical Charter for coexistence of human and robot and have to understand about rights of the intelligent robot. Third, the security industry and learned circles have to recognize the important effect that the intelligent robot gets in the security industry and try to grope the safety management and the application plan on the intelligent robot. Also, the security industry and learned circles should concern not only using and managing of the intelligent robot including the military robot, the security robot but also protecting human from the intelligent robot.

  • PDF

Technological Trends in Intelligent Cyber Range (지능형 사이버 훈련장의 기술 동향)

  • Yu, J.H.;Koo, K.J.;Kim, I.K.;Moon, D.S.
    • Electronics and Telecommunications Trends
    • /
    • v.37 no.4
    • /
    • pp.36-45
    • /
    • 2022
  • As the interest in achieving an intelligent society grows with the fourth industrial revolution's development, information and communications technologies technologies like artificial intelligence (AI), Internet of Things, virtual reality, information security, and blockchain technology are being actively employed in different fields for achieving an intelligent society. With these modifications, the information security paradigm in industrial and public institutions, like personal sensitive data, is quickly changing, and it is exposed to different cyber threats and breaches. Furthermore, as the number of cyber threats and breaches grows, so does the need for rapid detection and response. This demand can be satisfied by establishing cyber training programs and fostering experts that can improve cyber security abilities. In this study, we explored the domestic and international technology trends in cyber security education and training facilities for developing experts in information security. Additionally, the AI technology application in the cyber training ground, which can be established to respond to and deter cyber threats that are becoming more intelligent, was examined.

Trends of Intelligent Public Safety Service Technologies (지능형 치안 서비스 기술 동향)

  • Bang, J.S.;Park, W.J.;Yoon, S.Y.;Sin, J.H.;Lee, Y.T.
    • Electronics and Telecommunications Trends
    • /
    • v.34 no.1
    • /
    • pp.111-122
    • /
    • 2019
  • As society develops, the demand for safety and security services increases. Developed nations such as the United States use advanced technology to lower crime rate and promote intelligent security services. First, this article examines intelligent systems that are used for monitoring and detecting crimes and dangerous situations. Recently, we have been studying technologies that enable preemptive responses through prediction of crime and hazardous situations. In this paper, we examine the cases of security services based on a crime/risk prediction model and explain the structure and major technologies of an intelligent security system. In addition, we propose a direction for technological development for achieving future security services.

Efficient container door Open/Closed detection mechanism for Container Security Device(ConTracer) (컨테이너 보안장치(ConTracer)를 위한 효율적인 컨테이너 도어 개폐감지 메커니즘)

  • Moon, Young-Sik;Lee, Eun-Kyu;Shin, Joong-Jo;Shon, Jung-Rock;Choi, Sung-Pill;Kim, Jae-Joong;Choi, Hyung-Rim
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2011.05a
    • /
    • pp.831-834
    • /
    • 2011
  • This paper is intended as performance verification of efficient container door Open/Closed detection mechanism for Container Security Device(ConTracer) to container cargo transportation. Container door Open/Closed detection mechanism using Reed sensor is important to satisfies the US Department of homeland security customs and border protections requirements to many types of container door. Also, Verify that the container door is configured correctly and that you can check the illegal opening. In this article, Performance valuation of this Contacer on reed sensor has been verified through field test for each other 30 containers. Once the improvement has been made, we are suggest that propose skills will meet the highest standards for container security safety.

  • PDF

Security Trends for Autonomous Driving Vehicle (자율주행 자동차 보안기술 동향)

  • Kwon, H.C.;Lee, S.J.;Choi, J.Y.;Chung, B.H.;Lee, S.W.;Nah, J.C.
    • Electronics and Telecommunications Trends
    • /
    • v.33 no.1
    • /
    • pp.78-88
    • /
    • 2018
  • As the traffic environment gradually changes to autonomous driving and intelligent transport systems, vehicles are becoming increasingly complicated and intelligent, and their connectivity is greatly expandinged. As a result, attack vectors of such vehicles increasing, and security threats further expanding. Currently, various solutions for vehicle security are being developed and applied, but the damage caused by cyber attacks is still increasing. In recent years, vehicles such as the Tesla Model S and Mitsubishi Outlander have been hacked and remotely controlled by an attacker. Therefore, there is a need for advanced security technologies to cope with increasingly intelligent and sophisticated automotive cyber attacks. In this article, we introduce the latest trends of autonomous vehicles and their security threats, as well as the current status and issues of security technologies to cope with them.

A Method on the Implementation of Intelligent Security Service Application based on Spatial Information (공간정보기반 지능형 방범서비스 어플리케이션 개발)

  • Choi, Woo Chul;Na, Joon Yeop
    • Spatial Information Research
    • /
    • v.23 no.6
    • /
    • pp.89-98
    • /
    • 2015
  • In this study, The criteria for assessing the security-related functions and services using spatial information is deduced, and orders of priority a priority for the applicable alternatives of functions/services of intelligent security service application based on spatial information are suggested by calculating relative importance. Also this study suggested connection plan about service implementation of national security services by government ministry & local government. And, the intelligent security app service model which has possible substantiation and commercialization is proposed. This study performed the AHP as the final assessment criterions by 3 item in 1st class and 12 item in 2nd class. And, tried to implementation methods of the intelligent security service application(ex. control of emergency and the crime opportunity, real-time location tracking of protector, the device for missing child & dementia patient, user participation & provision of information).

Multimodal layer surveillance map based on anomaly detection using multi-agents for smart city security

  • Shin, Hochul;Na, Ki-In;Chang, Jiho;Uhm, Taeyoung
    • ETRI Journal
    • /
    • v.44 no.2
    • /
    • pp.183-193
    • /
    • 2022
  • Smart cities are expected to provide residents with convenience via various agents such as CCTV, delivery robots, security robots, and unmanned shuttles. Environmental data collected by various agents can be used for various purposes, including advertising and security monitoring. This study suggests a surveillance map data framework for efficient and integrated multimodal data representation from multi-agents. The suggested surveillance map is a multilayered global information grid, which is integrated from the multimodal data of each agent. To confirm this, we collected surveillance map data for 4 months, and the behavior patterns of humans and vehicles, distribution changes of elevation, and temperature were analyzed. Moreover, we represent an anomaly detection algorithm based on a surveillance map for security service. A two-stage anomaly detection algorithm for unusual situations was developed. With this, abnormal situations such as unusual crowds and pedestrians, vehicle movement, unusual objects, and temperature change were detected. Because the surveillance map enables efficient and integrated processing of large multimodal data from a multi-agent, the suggested data framework can be used for various applications in the smart city.