• Title/Summary/Keyword: Location privacy

Search Result 262, Processing Time 0.023 seconds

A study on a target-tracking and noncontact type biosignal measurment system Using IR-Radar and Pan-Tilt system (원격 비접촉식 목표 추적형 생체신호측정시스템에 관한 연구)

  • Choi, Kwang-Wook;Kim, Cheol-Sung;Yang, Chul-Seung;Lee, Jeong-Gi
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.18 no.9
    • /
    • pp.2237-2242
    • /
    • 2014
  • As Single households increases for reason of communication development, extending human life, there are many problems occuring all over the world. In order to solve this problem with an invasion of privacy and manintain a healthy life, this paper suggest non-contact type bio-signal measurement system using IR-Radar, displacement sensor and Pan-Tilt system. The proposed system can increse the distance of measured respiration from 1m to over 8m, which is comprised of two IR-Radar for location tracking, one displacement sensor for non-contact type bio-signal measurement and one stepping motor drive system. The proposed system is verified through experiments and were confirmed the possibility.

MissingFound: An Assistant System for Finding Missing Companions via Mobile Crowdsourcing

  • Liu, Weiqing;Li, Jing;Zhou, Zhiqiang;He, Jiling
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.10 no.10
    • /
    • pp.4766-4786
    • /
    • 2016
  • Looking for missing companions who are out of touch in public places might suffer a long and painful process. With the help of mobile crowdsourcing, the missing person's location may be reported in a short time. In this paper, we propose MissingFound, an assistant system that applies mobile crowdsourcing for finding missing companions. Discovering valuable users who have chances to see the missing person is the most important task of MissingFound but also a big challenge with the requirements of saving battery and protecting users' location privacy. A customized metric is designed to measure the probability of seeing, according to users' movement traces represented by WiFi RSSI fingerprints. Since WiFi RSSI fingerprints provide no knowledge of users' physical locations, the computation of probability is too complex for practical use. By parallelizing the original sequential algorithms under MapReduce framework, the selecting process can be accomplished within a few minutes for 10 thousand users with records of several days. Experimental evaluation with 23 volunteers shows that MissingFound can select out the potential witnesses in reality and achieves a high accuracy (76.75% on average). We believe that MissingFound can help not only find missing companions, but other public services (e.g., controlling communicable diseases).

Analysis of VANET Authentication Protocol using Casper in the Formal Verification (정형검증 도구인 Casper를 이용한 VANET 인증 프로토콜 분석)

  • Lee, Su-Youn;Ahn, Hyo-Beom
    • Convergence Security Journal
    • /
    • v.12 no.1
    • /
    • pp.27-33
    • /
    • 2012
  • VANET(Vehicular Ad-hoc Network) is a kind of ad hoc networks consist of intelligence vehicular ad nodes, and has become a hot emerging research project in many fields. It provide traffic safety, cooperative driving and etc. but has also some security problems that can be occurred in general ad hoc networks. Also, in VANET, vehiculars sho uld be able to authenticate each other to securely communicate with network-based infrastructure, and their location s and identifiers should not be exposed from the communication messages. This paper explains V2I authentication pr otocol using a hash function that preserves the user privacy. In addition, we analyze the security stability of the V2I authentication protocol using Casper in the formal verification technique. As a result, V2I authentication protocol us ing hash function prove a stability.

Source-Location Privacy in Wireless Sensor Networks Countermeasures and Analysis (무선 센서 네트워크에서의 소스 위치 프라이머시 : 익명성 제공 방법 및 수학적 분석)

  • Lee Song-Woo;Park Young-Hun;Son Ju-Hyung;Seo Seune-Woo;Kang Yu;Moon Ho-Kun;Lee Myuong-Soo
    • Proceedings of the Korea Institutes of Information Security and Cryptology Conference
    • /
    • 2006.06a
    • /
    • pp.778-783
    • /
    • 2006
  • 최근 센서 네트워크 분야를 비롯해 네트워크 분야에서 내용 보호, 인증뿐만 아니라 Source의 위치 프라이비시와 관련하여 많은 연구가 이루어지고 있다. 특히 센서 네트워크에서의 Source 위치는 실제 센서의 지리적 위치이기 때문에 Source의 위치를 노출하지 않는 것이 매우 중요하다. 그리고 인터넷과 Ad-Hoc 네트워크에서 익명성(Anonymity)을 제공하기 위한 기법들이 많이 제안되었지만, 이러한 기법들은 센서 네트워크에 적합하지 않기 때문에 센서 네트워크의 특성에 맞는 익명성 제공 요법이 요구되고 있다. 본 논문에서는 Source의 익명성과 관련해 센서네트워크에서 나타날 수 있는 Eavesdropper의 유형을 정의하고, 이러한 Eavesdropper의 유형에 따라 Source의 익명성을 제공할 수 있는 방법을 제안하였다. 그리고 제안한 방법이 얼마만큼의 익명성을 제공하는가를 정량화하기 위해 엔트로피(Entropy) 성질을 이용해 수학적으로 분석하였다. 그 결과, 제안하는 방법이 보다 높은 익명성을 제공하고, 센서의 전송 거리가 Source의 익명성 제공에 있어 매우 중요한 요소임을 확인하였다.

  • PDF

Design Guidelines for the Housing for the Elderly -Based on the POE of Assisted Living Facilities in USA- (반의존 노인을 위한 시설주거의 계획방향 -미국 반의존형 노인시설주거의 노인거주자와 근무자의 거주후 평가결과를 기초로-)

  • 오찬옥
    • Journal of the Korean housing association
    • /
    • v.12 no.4
    • /
    • pp.73-81
    • /
    • 2001
  • The purpose of this study was to carry out POE of assisted living housing and suggest the design guidelines for the housing complex for the elderly. The subjects were residents(old persons) and staff who lived or worked in three assisted living housing in Cincinnati, Ohio. Interview and survey method using questionnaire were used. The design guidelines for the housing for the elderly were suggested as follows: 1) the location of the housing for the elderly should be in or near the existing housing area, 2) the arrangement of spaces of the housing for the elderly should consist of small groupings rather than large and long corridor pattern, 3) the number of the housing units for the elderly should be small, under 100 units, 4) the housing units should be used by one older persons so that she/he could have the chance of privacy and personalization, 5) various common spaces such as art and craft room or game room should be provided, 6) accessibility should be considered, 7) the color and patterns of interior finishes should be differentiated according to floors or spaces and familiar ones should be used to make a homelike environment.

  • PDF

Mechanism of RFID Authentication for u-Vehicle (u-Vehicle 환경에 적합한 RFID 인증 메커니즘)

  • Rhee, Yoon-Jung;Kim, Do-Hyeon
    • The Journal of the Korea Contents Association
    • /
    • v.8 no.6
    • /
    • pp.66-73
    • /
    • 2008
  • The concept of u-Vehicle is a technological model that people try to build the ubiquitous world in the car which moves, by using the RFID technology as well as the telematics service based on the location. RFID is weak on the point of information security because RFID has possibility for being abused such as chasing, counterfeiting, and invading personal privacy. RFID's tags use a weak cryptographic algorithm. This paper presents the vulnerabilities of information security under u-Vehicle environments. To solve that, we propose a mechanism enhancing RFID tag's security but with low cost by reducing the number of mutual authentication stages and using the hash function.

The Study of Design and Implementation of RFID Emergency Medical Information System(REMIS) (RFID와 HL7을 이용한 응급 의료 정보 시스템 설계 및 구현에 관한 연구)

  • Hong, Kyu-Seog;Hwang, Sung-Oh;Lee, Hyun-Sook;Yoon, Young-Ro
    • Journal of Biomedical Engineering Research
    • /
    • v.28 no.5
    • /
    • pp.703-712
    • /
    • 2007
  • In this paper, we designed the RFID(Radio Frequency Identification) Emergency Medical Information System(REMIS). This REMIS offers the emergency patient's medical information using RFID and HL7(Health Level 7) to an emergency medical technician. In emergency situation as like coma, if the communication, from the patient's current location to the hospital, is possible, REMIS offer the medical information of the patient through REMIS server to an emergency medical technician. In the state of communication blocked, REMIS can offer the patient identification and the emergency information through RFID tag, which the patient wear, to an emergency medical technician. When this system was designed, the protection of the patient's medical information and their privacy was considered, and the HL7 was used to be compatible with another medical systems. Therefore, in this paper, REMIS was designed that it is always possible to offer the emergency patient's information to an emergency medical technician regardless of any communication status and to improve the emergency rescue process, effectively.

Implementation of Role Based Access Control Model for U-healthcare (유비쿼터스 헬스케어를 위한 역할 기반 접근제어 모델의 구현)

  • Lee, You-Ri;Park, Dong-Gue
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.10 no.6
    • /
    • pp.1256-1264
    • /
    • 2009
  • When unapproved users access to healthcare system and use medical information for other malicious purposes, it could severely threaten important information related to patients' life, because in ubiquitous environment healthcare service makes patient's various examination results, medical records or most information of a patient into data. Therefore, to solve these problems, we design RBAC(Role Based Access Control) for U-healthcare that can access control with location, time and context-awareness information like status information of user and protect patient's privacy. With implementation of the proposed model, we verify effectiveness of the access control model for healthcare in ubiquitous environment.

A Study on the Characteristics of Site Planning in Traditional Village - A Case Study of Asan Oeam Village - (전통마을의 배치계획 특성에 관한 연구 - 아산 외암민속마을을 중심으로 -)

  • Kim, Hun-Jong;Lee, Ho-Jung;Ryu, Soo-Hoon
    • Journal of the Korean Institute of Rural Architecture
    • /
    • v.14 no.3
    • /
    • pp.69-76
    • /
    • 2012
  • This study aims to investigate the mechanism that analysis of the layout-structure of the Traditional Village Oeam. It can identify through the division of area, the properties of layout residential type, the relationship between buildings and roads and location of buildings and a gate. Traditional Folk Village is our precious cultural heritage. However, now is time for our disappearing heritage due to the indiscriminate development. This study will good references for residential Complex in modern society. As a result of this study road in the center of village is divided into two areas. The road and stream plays an important role in the housing layout and composition of the village. Oeam village houses are separated by scale as large, middle, small scale housing. The courty yard is formed widely through a various of housing plan. So that ventilation and light is favorable even if the main house is high. Each house has the individuality with avoiding the village roads and using the byroads and stone wall. Therefore, each house can protect the privacy of houses.

An Empirical Study on Marketing of NFC and LBS in Public Performance (공연산업에서 NFC와 LBS 마케팅에 관한 실증적 연구)

  • Park, Beom-Jin;Jang, Jung-Hwan;Lee, Chang-Ho;Li, Guang-Zhu
    • Journal of the Korea Safety Management & Science
    • /
    • v.17 no.1
    • /
    • pp.301-308
    • /
    • 2015
  • To invigorate and develop marketing strategies in public performance, this thesis reviewed the literatures such as papers, academic materials and internet information on marketing in public performance. We performed surveys for specialists and non-specialists of public performance from on-line or off-line for questionnaire which is classified as demographic characteristics, tendency for seeing public performance and for knowledge of NFC and LBS, and analyzed the questionnaires for knowing the effects of NFC and LBS marketing in public performance. This thesis revealed generally a higher level of satisfaction with NFC than LBS, especially for specialists as compared with non-specilists. The reason of a lower level of satisfaction with LBS than NFC is that LBS technique has privacy problem about personal information by exposing the user location information. The reason of a lower level of satisfaction with NFC to non-specialists is that there are insufficiency of promotion for NFC technique and contents utilizing NFC. A total average score for a level of satisfaction of NFC and LBS service was revealed high as more than 3.50 out of 5.00. Through this thesis we suggest the public performance marketing strategies.