• Title/Summary/Keyword: Location Information Exposure

Search Result 63, Processing Time 0.032 seconds

Improved Authentication Protocol for RFID/USN Environment (RFID/USN 환경을 위한 개선된 인증 프로토콜)

  • Ahn, Hae-Soon;Bu, Ki-Dong;Yoon, Eun-Jun;Nam, In-Gil
    • Journal of the Institute of Electronics Engineers of Korea CI
    • /
    • v.46 no.1
    • /
    • pp.1-10
    • /
    • 2009
  • Recently, Shin and Park proposed an authentication protocol using the hash function and the XOR operation in RFID/USN environment. However, Shin and Park's proposed authentication protocol is vulnerable to spoofing attack and location tracking attack and tag key exposure attack, and it does not provide tag anonymity. In this paper, we propose an improved authentication protocol for the RFID/USN environment that can withstand those attacks. The proposed authentication protocol provides more improved secrecy and communication efficiency because it decreases the communication rounds compared with the Shin and Park's protocol.

Computation of geographic variables for air pollution prediction models in South Korea

  • Eum, Youngseob;Song, Insang;Kim, Hwan-Cheol;Leem, Jong-Han;Kim, Sun-Young
    • Environmental Analysis Health and Toxicology
    • /
    • v.30
    • /
    • pp.10.1-10.14
    • /
    • 2015
  • Recent cohort studies have relied on exposure prediction models to estimate individual-level air pollution concentrations because individual air pollution measurements are not available for cohort locations. For such prediction models, geographic variables related to pollution sources are important inputs. We demonstrated the computation process of geographic variables mostly recorded in 2010 at regulatory air pollution monitoring sites in South Korea. On the basis of previous studies, we finalized a list of 313 geographic variables related to air pollution sources in eight categories including traffic, demographic characteristics, land use, transportation facilities, physical geography, emissions, vegetation, and altitude. We then obtained data from different sources such as the Statistics Geographic Information Service and Korean Transport Database. After integrating all available data to a single database by matching coordinate systems and converting non-spatial data to spatial data, we computed geographic variables at 294 regulatory monitoring sites in South Korea. The data integration and variable computation were performed by using ArcGIS version 10.2 (ESRI Inc., Redlands, CA, USA). For traffic, we computed the distances to the nearest roads and the sums of road lengths within different sizes of circular buffers. In addition, we calculated the numbers of residents, households, housing buildings, companies, and employees within the buffers. The percentages of areas for different types of land use compared to total areas were calculated within the buffers. For transportation facilities and physical geography, we computed the distances to the closest public transportation depots and the boundary lines. The vegetation index and altitude were estimated at a given location by using satellite data. The summary statistics of geographic variables in Seoul across monitoring sites showed different patterns between urban background and urban roadside sites. This study provided practical knowledge on the computation process of geographic variables in South Korea, which will improve air pollution prediction models and contribute to subsequent health analyses.

A Mutual Authentication Protocol using Key Change Step by Step for RFID Systems (단계적 키 변환을 이용한 RFID 상호 인증 프로토콜)

  • Chung, Kyung-Ho;Kim, Kyoung-Youl;Oh, Se-Jin;Lee, Jae-Kang;Park, Yong-Soo;Ahn, Kwang-Seon
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.35 no.3B
    • /
    • pp.462-473
    • /
    • 2010
  • The RFID system has the security problem of location tracking and user privacy. In order to solve this problem, the cryptographic access method using hash function is difficult to in real applications. Because there is a limit of computing and storage capacity of Tag, but the safety is proved. The lightweight authentication methods like HB and LMAP guarantee the high efficiency, but the safety is not enough to use. In this paper, we use the AES for RFID Authentication, and solve the problem of using fixed key with key change step by step. The symmetric keys of the tag and server are changed by the random number generated by tag, reader and server successively. This could prevent the key exposure. As a result, the output of the tag and reader always changes. These key changes could make it possible to prevent eavesdropping, replay attack, location tracking and spoofing.

Secure Password System against Imposter (타인의 관찰에 의한 패스워드 노출로부터 안전한 패스워드 시스템)

  • Park, Sung-Bae;Park, Seung-Bae;Kang, Moon-Seol
    • The KIPS Transactions:PartC
    • /
    • v.10C no.2
    • /
    • pp.141-144
    • /
    • 2003
  • We present a new password system, called dual password system, with the user verification procedure. Dual password system is the first password system in the world preventing the exposure of secret information to imposter at the terminal. User of dual password system matches two alphabets at same location of first password and second password iteratively for inputting password. Therefore, the deriving method of first password and second password from the password is important in dual password system. Related to the deriving method of first password and second password from password, a new problem, called dual password derivation problem, is defined, and the evaluation factors for the solutions of the dual password derivation problem are presented.

New Mobile Terminated Protocol for User Privacy Protection in Mobile Communication Environments (이동통신 환경에서 사용자 프라이버시 보호를 위한 새로운 이동 착호프로토콜)

  • Kim, Soon-Seok
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.10 no.12
    • /
    • pp.2193-2201
    • /
    • 2006
  • In related to mobile communication environment. Kesdogan and Pfitzmann[1,2,3] proposed solutions using temporary pseudonym identification, called TP(Temporary Pseudonym) to solve the problems concerning current locations of mobile users and exposure of their movements in the privacy aspect. After that, we proposed more improved method protecting mobile users from active attacks of network providers in [4]. But it is the case that mobile users are located in only home domain. As a more extended method. we propose new mobile terminated protocol protecting user privacy in case of moving from the home domain to the remote domain and analyze its security.

An Approach of Product Placement and Path Evaluation Using Social Network Subgroup: Focusing on Shopping Basket Data Analysis (사회연결망 서브그룹을 통한 소매점 상품배치 및 동선 평가: 장바구니 데이터 분석을 중심으로)

  • Yoon, Han-Seong
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.17 no.4
    • /
    • pp.109-120
    • /
    • 2021
  • Despite the growing online exposure of retailes, offline retail channels still outperform online channels in the total retail volume of some countries. There is much interest in the physical layout plans of retail stores to expand sales. Product placement that have a large impact on customer purchasing behavior at offline retailers influences customer movement and sales volume. But in many cases, each retailer relies on unsystematic and autonomous product placement. When multiple products are sold with one purchase, the customer's movement for shopping may be evaluated in terms of customer efficiency and additional impulse purchase. In this paper, the social network is applied to sales data of a retail store and the result is used for evaluation of product placement and customer path. The frequent sales product composition was identified using k-core from sales data in the form of shopping baskets. The location was checked for the identified compositions of products, the spatial variance was measured and the customer's path was identified. With these results, the store arrangement of products was evaluated with appropriate improvement directions. The analysis method of this paper can be an alternative analysis approach for better layout of retail stores.

Cosmological constraints using BAO - From spectroscopic to photometric catalogues

  • Sridhar, Srivatsan
    • The Bulletin of The Korean Astronomical Society
    • /
    • v.44 no.1
    • /
    • pp.56.2-56.2
    • /
    • 2019
  • Measurement of the location of the baryon acoustic oscillation (BAO) feature in the clustering of galaxies has proven to be a robust and precise method to measure the expansion of the Universe. The best constraints so far have been provided from spectroscopic surveys because the errors on the redshift obtained from spectroscopy are minimal. This in turn means that the errors along the line-of-sight are reduced and so one can expect constraints on both angular diameter distance $D_A$ and expansion rate $H^{-1}$. But, future surveys will probe a larger part of the sky and go to deeper redshifts, which correspond to more number of galaxies. Analysing each galaxy using spectroscopy, which is a time consuming task, will not be practically possible. So, photometry will be the most convenient way to measure redshifts for future surveys such as LSST, Euclid, etc. The advantage of photometry is measuring the redshift of vast number of galaxies in a single exposure, but the disadvantage are the errors associated with the measured redshifts. Using a wedge approach, wherein the clustering is split into different wedges along the line-of-sight ${\pi}$ and across the line-of-sight ${\sigma}$, we show that the BAO information can be recovered even for photometric catalogues with errors along the line-of-sight. This means that we can get cosmological distance constraints even if we don't have spectroscopic information.

  • PDF

VANET Privacy Assurance Architecture Design (VANET 프라이버시 보장 아키텍처 설계)

  • Park, Su-min;Hong, Man-pyo;Shon, Tae-shik;Kwak, Jin
    • Journal of Internet Computing and Services
    • /
    • v.17 no.6
    • /
    • pp.81-91
    • /
    • 2016
  • VANET is one of the most developed technologies many people have considered a technology for the next generation. It basically utilizes the wireless technology and it can be used for measuring the speed of the vehicle, the location and even traffic control. With sharing those information, VANET can offer Cooperative ITS which can make a solution for a variety of traffic issues. In this way, safety for drivers, efficiency and mobility can be increased with VANET but data between vehicles or between vehicle and infrastructure are included with private information. Therefore alternatives are necessary to secure privacy. If there is no alternative for privacy, it can not only cause some problems about identification information but also it allows attackers to get location tracking and makes a target. Besides, people's lives or property can be dangerous because of sending wrong information or forgery. In addition to this, it is possible to be information stealing by attacker's impersonation or private information exposure through eavesdropping in communication environment. Therefore, in this paper we propose Privacy Assurance Architecture for VANET to ensure privacy from these threats.

A Deep Learning Model for Judging Presence or Absence of Lesions in the Chest X-ray Images (흉부 디지털 영상의 병변 유무 판단을 위한 딥러닝 모델)

  • Lee, Jong-Keun;Kim, Seon-Jin;Kwak, Nae-Joung;Kim, Dong-Woo;Ahn, Jae-Hyeong
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.24 no.2
    • /
    • pp.212-218
    • /
    • 2020
  • There are dozens of different types of lesions that can be diagnosed through chest X-ray images, including Atelectasis, Cardiomegaly, Mass, Pneumothorax, and Effusion. Computed tomography(CT) test is generally necessary to determine the exact diagnosis and location and size of thoracic lesions, however computed tomography has disadvantages such as expensive cost and a lot of radiation exposure. Therefore, in this paper, we propose a deep learning algorithm for judging the presence or absence of lesions in chest X-ray images as the primary screening tool for the diagnosis of thoracic lesions. The proposed algorithm was designed by comparing various configuration methods to optimize the judgment of presence of lesions from chest X-ray. As a result, the evaluation rate of lesion presence of the proposed algorithm is about 1% better than the existing algorithm.

Real-time Underground Facility Map Production Using Drones (드론을 이용한 실시간 지하시설물도 작성)

  • NO, Hong-Suk;BAEK, Tae-Kyung
    • Journal of the Korean Association of Geographic Information Studies
    • /
    • v.20 no.4
    • /
    • pp.39-54
    • /
    • 2017
  • Between 1998 and 2010, the computerization of underground facilities was completed in 84 cities. Since 2011, new pipelines have been laid or existing pipelines have been maintained, renovated, and renewed. To measure the exact location and depth of the exposure pipe, a map of underground facilities was created before filling the ground. This method is based on the time when the underground facilities of the National Geographic Information Institute Regulation No. 134 of the National Geographic Information Office revised in 2010 were drafted. The process of the drone taking the video is based on a theoretical basis of ground control points. The method works by removing all ground control points located outside of the error range and re-processing it for calculating the best result. Furthermore, using a drone-based spontaneous measuring method allows workers to obtain a high accuracy underground facilities map in error bound. The proposed method could be used as a new way to standardize the processing.