• Title/Summary/Keyword: Physical Security System

Search Result 461, Processing Time 0.024 seconds

Design and Implementation of Building Control System based 3D Modeling (3D 모델링 기반 빌딩관제시스템의 설계 및 구현)

  • Moon, Sang Ho;Kim, Byeong Mok;Lee, Gye Eun
    • Journal of Korea Multimedia Society
    • /
    • v.23 no.5
    • /
    • pp.673-682
    • /
    • 2020
  • Buildings are becoming more and more high-rise and large-scale in recent years, so in the event of a disaster such as a fire, enormous human and economic damage is expected. Therefore, management, security, and fire control are essential for large buildings in the city. Because these large buildings are very complex outside and inside, they need a three-dimensional control based on 3D modeling rather than a simple flat-oriented control. To do this, this paper designed and implemented a building control system based on 3D modeling. Specifically, we designed a 3D building / facility editing module for 3D modeling of buildings, a 3D based control module for building control, and a linkage module that connects information such as firefighting equipment, electrical equipment and IoT equipment. Based on this design, a building control system based on 3D modeling was implemented.

An Anonymity-Preserving User Authentication and Authorization Model for Ubiquitous Computing Environments (유비쿼터스 컴퓨팅 환경을 위한 익명성을 보장하는 사용자 인증 및 접근제어 모델)

  • Kang Myung-Hee;Ryou Hwang-Bin
    • Journal of the Institute of Electronics Engineers of Korea CI
    • /
    • v.42 no.4 s.304
    • /
    • pp.25-32
    • /
    • 2005
  • The spread of mobile devices, PDAs and sensors has enabled the construction of ubiquitous computing environments, transforming regular physical spaces into 'Smart space' augmented with intelligence and enhanced with services. However, the deployment of this computing paradigm in real-life is disturbed by poor security, particularly, the lack of proper authentication and authorization techniques. Also, it is very important not only to find security measures but also to preserve user privacy in ubiquitous computing environments. In this Paper, we propose efficient user authentication and authorization model with anonymity for the privacy-preserving for ubiquitous computing environments. Our model is suitable for distributed environments with the computational constrained devices by using MAC-based anonymous certificate and security association token instead of using Public key encryption technique. And our Proposed Protocol is better than Kerberos system in sense of cryptographic computation processing.

Malware Behavior Analysis based on Mobile Virtualization (모바일 가상화기반의 악성코드 행위분석)

  • Kim, Jang-Il;Lee, Hee-Seok;Jung, Yong-Gyu
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.15 no.2
    • /
    • pp.1-7
    • /
    • 2015
  • As recent smartphone is used around the world, all of the subscribers of the mobile communication is up to 47.7% about 24 million people. Smartphone has a vulnerability to security, and security-related incidents are increased in damage with the smartphone. However, precautions have been made, rather than analysis of the infection of most of the damage occurs after the damaged except for the case of the expert by way of conventional post-countermeasure. In this paper, we implement a mobile-based malware analysis systems apply a virtualization technology. It is designed to analyze the behavior through it. Virtualization is a technique that provides a logical resources to the guest by abstracting the physical characteristics of computing resources. The virtualization technology can improve the efficiency of resources by integrating with cloud computing services to servers, networks, storage, and computing resources to provide a flexible. In addition, we propose a system that can be prepared in advance to buy a security from a user perspective.

Security Analysis and Improvements of Authentication Protocol for Privacy Protection in RFID Systems (프라이버시 보호를 위한 RFID 인증 프로토콜의 안전성 분석과 개선)

  • Kim, Jiye;Won, Dongho
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.41 no.5
    • /
    • pp.581-591
    • /
    • 2016
  • RFID(Radio Frequency IDentification) is a key technology in ubiquitous computing and is expected to be employed in more fields in the near future. Nevertheless, the RFID system is vulnerable to attacks by eavesdropping or altering of the messages transmitted in wireless channels. In 2013, Oh et al. proposed a mutual authentication protocol between a tag and a reader in RFID systems. Their protocol is designed to resist location tracking for privacy protection. However, all tags and readers use only one network-wide key in their protocol and tags are usually vulnerable to physical attacks. We found that their protocol is still vulnerable to tag/reader impersonation attacks and location tracking if an attacker obtains the network-wide key from a tag. In this paper, we propose a security improved authentication protocol for privacy protection in RFID systems. In addition, we demonstrate that the proposed scheme is efficient in terms of computation and communication costs.

A Study on CA-VPN Design using Authentication Mechanism (인증 메커니즘을 이용한 CA-VPN 설계에 관한 연구)

  • 김도문;전정훈;전문석
    • Journal of the Korea Society of Computer and Information
    • /
    • v.8 no.1
    • /
    • pp.60-68
    • /
    • 2003
  • Now the development of using a internet and security equipment is Processed actively. But It is presented problems about compatability and availability between variable equipment as several protocol. It is able to occur the Problem which is not considered efficiency as monopoly security equipment for the standardization of some vendor As a using of VPN gateway equipment. the same equipments have been actually used only for sale a communication equipment which are not confirmed(authenticate) between of mutual equipments. These problem is remain which are not considered suitable network environment and Position by mutual authentication Processing. Because it is considered for only sale a equipment of several vendor. And You will be remain where is unable to protect from attack of using the same equipment, and You will need a actually Protected method. By authentication system of base on Pn , although there is an intended attack from the third intruder, users can be protected with safe from the physical attacks since he is not a Permitted user by employing CA-VPN gateway that is more viable than the previous VPN connection in its security and certification.

  • PDF

A New Universally Verifiable and Receipt-free Electronic Voting Scheme Using Only One-way Untappable Channels (일방향 도청 불가능한 채널만을 이용하여 전체검증과 매표방지를 제공하는 새로운 전자선거 기법)

  • 조진현;김상진;오희국
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.13 no.2
    • /
    • pp.49-61
    • /
    • 2003
  • Electronic voting schemes must provide universal verifiability and receipt-freeness, as well as basic properties such as privacy, eligibility, to make the election fair and transparent. But it is difficult to provide both universal verifiability and receipt-freeness because they are mutually contradictory in their objective. To date, most electronic voting schemes provide only one of these properties and those few that provide both properties are not practical due to heavy computational load. In this paper, we present an efficient electronic voting scheme that provides both properties. The proposed scheme uses a trusted third party called HR(Honest Randomizer) and requires only one-way untappable channels from HRs to voters. Among the schemes that assume only one-way untappable channel this scheme requires the least amount of computation. Among the schemes that provide both properties, this scheme uses the weakest physical assumption. We also discuss the security of the system and compare our scheme with other related schemes.

Determination Method of Security Threshold using Fuzzy Logic for Statistical Filtering based Sensor Networks (통계적 여과 기법기반의 센서 네트워크를 위한 퍼지로직을 사용한 보안 경계 값 결정 기법)

  • Kim, Sang-Ryul;Cho, Tae-Ho
    • Journal of the Korea Society for Simulation
    • /
    • v.16 no.2
    • /
    • pp.27-35
    • /
    • 2007
  • When sensor networks are deployed in open environments, all the sensor nodes are vulnerable to physical threat. An attacker can physically capture a sensor node and obtain the security information including the keys used for data authentication. An attacker can easily inject false reports into the sensor network through the compromised node. False report can lead to not only false alarms but also the depletion of limited energy resource in battery powered sensor networks. To overcome this threat, Fan Ye et al. proposed that statistical on-route filtering scheme(SEF) can do verify the false report during the forwarding process. In this scheme, the choice of a security threshold value is important since it trades off detection power and energy, where security threshold value is the number of message authentication code for verification of false report. In this paper, we propose a fuzzy rule-based system for security threshold determination that can conserve energy, while it provides sufficient detection power in the SEF based sensor networks. The fuzzy logic determines a security threshold by considering the probability of a node having non-compromised keys, the number of compromised partitions, and the remaining energy of nodes. The fuzzy based threshold value can conserve energy, while it provides sufficient detection power.

  • PDF

A Study of TRM and ATC Determination for Electricity Market Restructuring (전력산업 구조개편에 대비한 적정 TRM 및 ATC 결정에 관한 연구)

  • 이효상;최진규;신동준;김진오
    • The Transactions of the Korean Institute of Electrical Engineers A
    • /
    • v.53 no.3
    • /
    • pp.129-134
    • /
    • 2004
  • The Available Transfer Capability (ATC) is defined as the measure of the transfer capability remaining in the physical transmission network for further commercial activity above already committed uses. The ATC determination s related with Total Transfer Capability (TTC) and two reliability margins-Transmission Reliability Capability (TRM) and Capacity Benefit Margin(CBM) The TRM is the component of ATC that accounts for uncertainties and safety margins. Also the TRM is the amount of transmission capability necessary to ensure that the interconnected network is secure under a reasonable range of uncertainties in system conditions. The CBM is the translation of generator capacity reserve margin determined by the Load Serving Entities. This paper describes a method for determining the TTC and TRM to calculate the ATC in the Bulk power system (HL II). TTC and TRM are calculated using Power Transfer Distribution Factor (PTDF). PTDF is implemented to find generation quantifies without violating system security and to identify the most limiting facilities in determining the network’s TTC. Reactive power is also considered to more accurate TTC calculation. TRM is calculated by alternative cases. CBM is calculated by LOLE. This paper compares ATC and TRM using suggested PTDF with using CPF. The method is illustrated using the IEEE 24 bus RTS (MRTS) in case study.

Design and Implementation of Hybrid VR lock system by Arduino Control (아두이노 제어를 통한 증강현실 도어록 설계 및 구현)

  • Lee, Kyung-Mu;Kim, Jin-Il
    • Journal of the Institute of Convergence Signal Processing
    • /
    • v.15 no.3
    • /
    • pp.97-103
    • /
    • 2014
  • Recently, digital door locks have been widely used as physical security devices for the door. Although they are convenient compared to the existing lock system, they have the problem of being opened by an electric shock. In this study, to improve safety, a method to hide the door-lock device inside and to display the door-lock on a user's smart-phone screen through the augmented reality is suggested. Furthermore, an additional function has been added which provides memo notes to facilitate communication among family members. The results of this study have been implemented by using motors to control locks, Wi-Fi shield, Arduino, and a virtually created door and showed desirable experimental results.

A Hierarchical Solution Approach for Occupational Health and Safety Inspectors' Task Assignment Problem

  • Arikan, Feyzan;Sozen, Songul K.
    • Safety and Health at Work
    • /
    • v.12 no.2
    • /
    • pp.154-166
    • /
    • 2021
  • Background: Occupational health and safety (OHS) is a significant interest of all governments to prevent workplace hazards. Although appropriate legislation and regulations are essentials for the protection of workers, they are solely not enough. Application of them in practice should be secured by an efficient inspection system. Fundamental components of an inspection system are inspectors and their audit tasks. Maintaining the fair balanced task assignment among inspectors strictly enhances the efficiency of the overall system. Methods: This study proposes a two-phased goal programming approach for OHS inspectors' task assignments and presents a case study. Results: The solution approach gives the balanced assignment of inspectors to the workplaces in different cities of the country in the planning period. The obtained schedule takes into account the distances covered by the work places and the number of the workplaces' employees to be audited and pays attention to the human factors by considering the preferences of the inspectors. The comparisons between the obtained optimal schedule and the implemented one that is produced manually show that the approach not only maintains the technical requirements of the problem, but also provides social and physical balance to the task assignment. Conclusion: Both the approach and the application study are expected to offer fruitful inspirations in the area of safety management and policy and they provide a good guide for social policy and organizational aspects in the field of OHS inspectors' task assignment.