• 제목/요약/키워드: Physical Security

검색결과 1,038건 처리시간 0.023초

다중 채널 인증 기반 보안 카드의 설계 및 구현 (Multi-Channel Authentication based Security Card Design and Implementation)

  • 서화정;김호원
    • 한국정보통신학회논문지
    • /
    • 제20권1호
    • /
    • pp.81-86
    • /
    • 2016
  • 본 논문에서는 다중 채널 보안카드 설계 기법을 제공한다. 해당 보안 카드는 투명하게 제작되어 스마트폰의 화면과 합쳐서 나타나는 정보를 통해 비밀값을 도출하게 된다. 이는 기존 보안카드가 가지는 레이아웃의 물리적인 한계를 제거하여 보안카드가 가지는 복잡도를 향상시켰으며 1채널 보안카드의 단점인 물리적 노출에 대한 취약점을 다중 채널로 확장하여 한 번의 물리적 보안카드의 노출이 모든 비밀 정보의 노출로 연결되는 문제점도 해결하였다.

Survey on Security in Wireless Sensor

  • Li, Zhijun;Gong, Guang
    • 정보보호학회논문지
    • /
    • 제18권6B호
    • /
    • pp.233-248
    • /
    • 2008
  • Advances in electronics and wireless communication technologies have enabled the development of large-scale wireless sensor networks (WSNs). There are numerous applications for wireless sensor networks, and security is vital for many of them. However, WSNs suffer from many constraints, including low computation capability, small memory, limited energy resources, susceptibility to physical capture, and the lack of infrastructure, all of which impose unique security challenges and make innovative approaches desirable. In this paper, we present a survey on security issues in wireless sensor networks. We address several network models for security protocols in WSNs, and explore the state of the art in research on the key distribution and management schemes, typical attacks and corresponding countermeasures, entity and message authentication protocols, security data aggregation, and privacy. In addition, we discuss some directions of future work.

Develop an Effective Security Model to Protect Wireless Network

  • Ataelmanan, Somya Khidir Mohmmed;Ali, Mostafa Ahmed Hassan
    • International Journal of Computer Science & Network Security
    • /
    • 제21권3호
    • /
    • pp.48-54
    • /
    • 2021
  • Security is an important issue for wireless communications and poses many challenges. Most security schemes have been applied to the upper layers of communications networks. Since in a typical wireless communication, transmission of data is over the air, third party receiver(s) may have easy access to the transmitted data. This work examines a new security technique at the physical layer for the sake of enhancing the protection of wireless communications against eavesdroppers. We examine the issue of secret communication through Rayleigh fading channel in the presence of an eavesdropper in which the transmitter knows the channel state information of both the main and eavesdropper channel. Then, we analyze the capacity of the main channel and eavesdropper channel we also analyze for the symbol error rate of the main channel, and the outage probability is obtained for the main transmission. This work elucidate that the proposed security technique can safely complement other Security approaches implemented in the upper layers of the communication network. Lastly, we implement the results in Mat lab

X-Ray Security Checkpoint System Using Storage Media Detection Method Based on Deep Learning for Information Security

  • Lee, Han-Sung;Kim Kang-San;Kim, Won-Chan;Woo, Tea-Kun;Jung, Se-Hoon
    • 한국멀티미디어학회논문지
    • /
    • 제25권10호
    • /
    • pp.1433-1447
    • /
    • 2022
  • Recently, as the demand for physical security technology to prevent leakage of technical and business information of companies and public institutions increases, the high tech companies are operating X-ray security checkpoints at building entrances to protect their intellectual property and technology. X-ray security checkpoints are operated to detect cameras and storage media that may store or leak important technologies in the bags of people entering and leaving the building. In this study, we propose an X-ray security checkpoint system that automatically detects a storage medium in an X-ray image using a deep learning based object detection method. The proposed system consists of an edge computing unit and a cloud-computing unit. We employ the RetinaNet for automatic storage media detection in the X-ray security checkpoint images. The proposed approach achieved mAP of 95.92% on private dataset.

스마트시티 위험요인과 저항에 관한 연구 (A Study on Smart City Risk Factors and Resistance)

  • 박현애;유영천;이환수
    • 융합보안논문지
    • /
    • 제20권2호
    • /
    • pp.15-28
    • /
    • 2020
  • 스마트시티는 기존 도시의 문제를 해결하고 새로운 부가가치를 창출할 것으로 큰 기대를 받고 있으나, 보안위험 증가에 우려 또한 증가하고 있다. 보안위험 인식에 따른 스마트시티에 대한 부정적 태도는 4차산업혁명 기술 활성화 및 스마트시티의 발전을 위해서도 개선해야 하는 문제이다. 이에 본 연구는 지각된 위험 이론과 사용자 저항이론을 바탕으로 스마트시티 내 위험요인과 스마트시티 저항 태도 간 관계를 통계적으로 분석하였다. 288명의 연구 표본을 대상으로 한 실증 분석결과에 따르면, 보안 위험, 사회적 위험, 신체적 위험요인은 스마트시티 저항에 직접적인 영향을 미치는 반면, 경제적, 성능, 사생활 침해에 대한 위험은 유의미한 영향이 없는 것으로 나타났다. 또한, 보안위험이 다른 위험에 선행요인으로 작용할 수 있다는 것을 검증하였으며, 스마트시티 환경에서는 사생활 침해 위험과 보안 위험에 대해 구분해서 논의할 필요성이 있음을 확인하였다. 본 연구는 일반인들 관점에서 스마트시티 인식에 부정적인 영향을 미치는 위험요인을 논의함으로써, 스마트시티 활성화를 위해 보안 및 안전 문제와 더불어 사회적 교류를 위한 정책적 방안 마련이 필요함을 보여준다.

부사관 후보생 체력단련프로그램운영을 통한 국가안보에 적합한 인력양성 (NCO candidates through fitness programs Appropriate staff training to national security)

  • 송준화
    • 융합보안논문지
    • /
    • 제14권6_1호
    • /
    • pp.113-120
    • /
    • 2014
  • 부사관으로서 요구되는 여러 가지 중 가장 중요하며 기본이 되는 것이 체력이라고 판단하여, 최근 부사관 선발시험 결과를 바탕으로 연구를 진행하고자 한다. 부사관 선발과정은 1차 필기, 2차 체력 및 면접을 통해 최종합격자를 발표하는 과정으로 이루어진다. 최근 지원자들의 두드러진 변화는 체력검정부분에 대한 준비가 많이 부족하며 기초체력 자체가 많이 부족한 학생들이 증가하는 추세이다. 초급간부의 기본이라고 할 수 있는 기초체력 그 중에서 오래달리기에 준비가 많이 필요해 보인 다. 따라서 부사관 준비생들의 기초자료분석 및 효과적인 수업적용을 통해 우리 군이 요구하는 정신적, 신체적 소양을 갖춘 우수한 인재 양성 모형을 제시하고자 한다.

금융보안을 위한 물리적 보안 카드의 설계 및 구현 (Design and Implementation of Physical Secure Card for Financial Security)

  • 서화정;김호원
    • 한국정보통신학회논문지
    • /
    • 제19권4호
    • /
    • pp.855-863
    • /
    • 2015
  • 본 논문에서는 전자금융 신종 사기 수법에 의한 사용자의 비밀정보 유출을 방지하기 위하여 자신이 가진 보안카드와 스마트 폰을 이용하여 금융거래 사이트를 검증하는 새로운 기법을 제안한다. 이를 위해 보안카드를 새롭게 디자인하여 공정한 사이트에 접속하는 경우에만 보안카드와 스마트폰을 통해 사이트의 인증이 가능하도록 하였다. 또한 기존의 OTP를 통한 보안 인증에서는 방어할 수 없었던 중간자 공격을 사용자의 거래 내역에 따른 보안카드 값 생성을 통해 효과적으로 방어하는 방안도 제안한다. 본 논문에서 제시하는 기법은 보안카드와 스마트폰을 통한 새로운 사이트 인증 기법으로써 사용자가 직접 피싱, 파밍 사이트를 판단할 수 있을 뿐 아니라 중간자 공격에 대한 대처방안으로도 매우 효과적인 기법이다.

Power-based Side-Channel Analysis Against AES Implementations: Evaluation and Comparison

  • Benhadjyoussef, Noura;Karmani, Mouna;Machhout, Mohsen
    • International Journal of Computer Science & Network Security
    • /
    • 제21권4호
    • /
    • pp.264-271
    • /
    • 2021
  • From an information security perspective, protecting sensitive data requires utilizing algorithms which resist theoretical attacks. However, treating an algorithm in a purely mathematical fashion or in other words abstracting away from its physical (hardware or software) implementation opens the door to various real-world security threats. In the modern age of electronics, cryptanalysis attempts to reveal secret information based on cryptosystem physical properties, rather than exploiting the theoretical weaknesses in the implemented cryptographic algorithm. The correlation power attack (CPA) is a Side-Channel Analysis attack used to reveal sensitive information based on the power leakages of a device. In this paper, we present a power Hacking technique to demonstrate how a power analysis can be exploited to reveal the secret information in AES crypto-core. In the proposed case study, we explain the main techniques that can break the security of the considered crypto-core by using CPA attack. Using two cryptographic devices, FPGA and 8051 microcontrollers, the experimental attack procedure shows that the AES hardware implementation has better resistance against power attack compared to the software one. On the other hand, we remark that the efficiency of CPA attack depends statistically on the implementation and the power model used for the power prediction.

Formalizing the Design, Evaluation, and Analysis of Quality of Protection in Wireless Networks

  • Lim, Sun-Hee;Yun, Seung-Hwan;Lim, Jong-In;Yi, Ok-Yeon
    • Journal of Communications and Networks
    • /
    • 제11권6호
    • /
    • pp.634-644
    • /
    • 2009
  • A diversity of wireless networks, with rapidly evolving wireless technology, are currently in service. Due to their innate physical layer vulnerability, wireless networks require enhanced security components. WLAN, WiBro, and UMTS have defined proper security components that meet standard security requirements. Extensive research has been conducted to enhance the security of individual wireless platforms, and we now have meaningful results at hand. However, with the advent of ubiquitous service, new horizontal platform service models with vertical crosslayer security are expected to be proposed. Research on synchronized security service and interoperability in a heterogeneous environment must be conducted. In heterogeneous environments, to design the balanced security components, quantitative evaluation model of security policy in wireless networks is required. To design appropriate evaluation method of security policies in heterogeneous wireless networks, we formalize the security properties in wireless networks. As the benefit of security protocols is indicated by the quality of protection (QoP), we improve the QoP model and evaluate hybrid security policy in heterogeneous wireless networks by applying to the QoP model. Deriving relative indicators from the positive impact of security points, and using these indicators to quantify a total reward function, this paper will help to assure the appropriate benchmark for combined security components in wireless networks.

Beyond the clinical walls: registered dietitian nutritionists providing medical nutrition therapy in the home setting

  • Hicks-Roof, Kristen;Xu, Jing;Fults, Amanda K.;Latortue, Krista Yoder
    • Nutrition Research and Practice
    • /
    • 제15권6호
    • /
    • pp.789-797
    • /
    • 2021
  • BACKGROUD/OBJECTIVES: Registered dietitian nutritionists (RDN) are providers of medical nutrition therapy (MNT) to address health and chronic disease. Traditionally, RDNs have provided care in healthcare facilities including hospitals and private care facilities. The purpose of this study was to determine how RDN individualized MNT in the home impacted nutrition, physical activity, and food security. SUBJECTS/METHODS: This is a secondary data analysis. The mean age of the participants (n = 1,007) was 51.6 years old with a mean body mass index (BMI) of 34.1 kg/m2. Individualized MNT visits were delivered by an RDN in the home setting from January to December 2019. Participants were referred by healthcare professionals or self-referred. Participants had MNT benefits covered by their health insurance plan (43.3% Medicaid; 39.8% private insurance; 7.9% Medicare, 9% other). Health outcomes related to nutrition care were measured. Outcomes included self-reported consumption of nutrition factors and physical activity. Our secondary outcome focused on food security. The changes in weight, BMI, physical activity, and nutrition factors were analyzed by a linear regression model or linear mixed model, adjusting for age, sex, baseline value, and number of appointments. Food security was summarized in a 2 by 2 contingency table. RESULTS: Baseline values had significantly negative impacts for all changes and number of appointments was significant in the changes for weight and BMI. Increases in physical activity were significant for both female and male participants, 10.4 and 12.6 minutes per day, respectively, while the changes in weight and BMI were not. Regarding dietary factors, the consumption total servings per day of vegetables (0.13) and water (3.35) significantly increased, while the consumption of total servings of whole grain (-0.27), fruit (-0.32), dairy (-0.80) and fish (-0.81) significantly decreased. About 24% (of overall population) and 45% (of Medicaid population) reported improvements in food security. CONCLUSIONS: This study found that home visits were a useful setting for MNT delivered by RDNs. There is a strong need for individualized counseling to meet the participants' needs and personal goals.