• Title/Summary/Keyword: Physical Security System

Search Result 460, Processing Time 0.025 seconds

Generation Comparison of the Factors Affecting Life Satisfaction of One-person Households (1인가구의 세대별 삶의 만족도 영향요인 비교 연구)

  • Kim, Meesook;Kim, Anna
    • The Journal of Korean Society for School & Community Health Education
    • /
    • v.21 no.1
    • /
    • pp.15-31
    • /
    • 2020
  • Background and objectives: One-person households are the fastest growing family type in Korea. They bring social concerns such as weakened social integration, increasing poverty and social isolation. They are not homogeneous but heterogeneous groups depending on their socio-demographic characteristics including generation. This study compared the life satisfaction level as well as factors affecting it among the three one-person household generations Methods: The 13th wave of the Korea Welfare Panel dataset with 1,187 respondents was utilized. For data analysis Chi-square test, analysis of variance and hierarchical regression analysis were employed. Generations are divided into three, namely young adult (20-39), the middle-aged (40-64) and the elderly (65 and over). Result: The life satisfaction level was highest among the young adult one-person household generation, followed by the middle-aged and the elderly generation. The common factors affecting life satisfaction of the three generations were physical as well as mental health, including self-esteem and depression. However, there were more factors different from generation to generation. As for the young adult, age, religion, and smoking were significant. As for the middle aged and the elderly, gender (male) and income were significant. Additionally, age, home-ownership and drinking were significant to the elderly generation. Conclusions: As there are differences as well as similarities among the three generations, policies for one-person households need to be devised considering these findings. For all generations, both physical and mental health policies are needed. For young adult strengthening social relations, providing decent jobs, and promoting anti-smoking policy are major agenda, and for the middle-aged and the elderly, assisting in social capital accumulation (for male), providing stable jobs and diverse leisure activities, and securing income. Additionally, for the elderly, expanding the social security system and housing support are needed.

The Authentication and Key Management Method based on PUF for Secure USB (PUF 기반의 보안 USB 인증 및 키 관리 기법)

  • Lee, Jonghoon;Park, Jungsoo;Jung, Seung Wook;Jung, Souhwan
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.38B no.12
    • /
    • pp.944-953
    • /
    • 2013
  • Recently, a storage media is becoming smaller and storage capacity is also becoming larger than before. However, important data was leaked through a small storage media. To solve these serious problem, many security companies manufacture secure USBs with secure function, such as data encryption, user authentication, not copying data, and management system for secure USB, etc. But various attacks, such as extracting flash memory from USBs, password hacking or memory dump, and bypassing fingerprint authentication, have appeared. Therefore, security techniques related to secure USBs have to concern many threats for them. The basic components for a secure USB are secure authentication and data encryption techniques. Though existing secure USBs applied password based user authentication, it is necessary to develop more secure authentication because many threats have appeared. And encryption chipsets are used for data encryption however we also concern key managements. Therefore, this paper suggests mutual device authentication based on PUF (Physical Unclonable Function) between USBs and the authentication server and key management without storing the secret key. Moreover, secure USB is systematically managed with metadata and authentication information stored in authentication server.

Enhancing Throughput and Reducing Network Load in Central Bank Digital Currency Systems using Reinforcement Learning (강화학습 기반의 CBDC 처리량 및 네트워크 부하 문제 해결 기술)

  • Yeon Joo Lee;Hobin Jang;Sujung Jo;GyeHyun Jang;Geontae Noh;Ik Rae Jeong
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.34 no.1
    • /
    • pp.129-141
    • /
    • 2024
  • Amidst the acceleration of digital transformation across various sectors, the financial market is increasingly focusing on the development of digital and electronic payment methods, including currency. Among these, Central Bank Digital Currencies (CBDC) are emerging as future digital currencies that could replace physical cash. They are stable, not subject to value fluctuation, and can be exchanged one-to-one with existing physical currencies. Recently, both domestic and international efforts are underway in researching and developing CBDCs. However, current CBDC systems face scalability issues such as delays in processing large transactions, response times, and network congestion. To build a universal CBDC system, it is crucial to resolve these scalability issues, including the low throughput and network overload problems inherent in existing blockchain technologies. Therefore, this study proposes a solution based on reinforcement learning for handling large-scale data in a CBDC environment, aiming to improve throughput and reduce network congestion. The proposed technology can increase throughput by more than 64 times and reduce network congestion by over 20% compared to existing systems.

A Study on the Promotion of the Availability of Multipurpose School Auditoriums for Use by Local Community - Based on Case Studies of Primary, Middle and High Schools in Busan - (학교시설 다목적강당의 지역주민이용 활성화 방안에 관한 연구 - 부산시내 초.중.고교 중심으로 -)

  • Bang, Taek-Hoon;Kim, Ki-Hwan
    • Journal of the Korean Institute of Educational Facilities
    • /
    • v.13 no.3
    • /
    • pp.56-65
    • /
    • 2006
  • The multipurpose auditoriums in schools are the center of local community and the places of their life-long education. The multipurpose auditoriums are to be open and made available for use by local public as far as it does not interfere with the education of the schools. However, most of them are not open to public on the pretext of management problems while demands of local communities for the opening of the facility is rising. The role of the multipurpose auditorium as the place of physical training and its maximum availability to local community have be taken into account of from its design stage. The location of the auditorium itself has to be close to the main entrance of the school for easy access, its facilities located in one common area, their management and maintenance scheme adopted appropriately but legally, and then security and safety measurement have to be devised. Also, more studies are necessary to propose detail regulations for local sports facilities and to develop their interrelationship and network, in connection with sophistication of school facilities and BTL system.

Metabolic Rate Estimation for ECG-based Human Adaptive Appliance in Smart Homes (인간 적응형 가전기기를 위한 거주자 심박동 기반 신체활동량 추정)

  • Kim, Hyun-Hee;Lee, Kyoung-Chang;Lee, Suk
    • Journal of Institute of Control, Robotics and Systems
    • /
    • v.20 no.5
    • /
    • pp.486-494
    • /
    • 2014
  • Intelligent homes consist of ubiquitous sensors, home networks, and a context-aware computing system. These homes are expected to offer many services such as intelligent air-conditioning, lighting control, health monitoring, and home security. In order to realize these services, many researchers have worked on various research topics including smart sensors with low power consumption, home network protocols, resident and location detection, context-awareness, and scenario and service control. This paper presents the real-time metabolic rate estimation method that is based on measured heart rate for human adaptive appliance (air-conditioner, lighting etc.). This estimation results can provide valuable information to control smart appliances so that they can adjust themselves according to the status of residents. The heart rate based method has been experimentally compared with the location-based method on a test bed.

Relay Selection for Two-hop Cooperative Jamming Network with Multiple Eavesdroppers (다수의 중계기와 도청자가 존재하는 협력 재밍 네트워크를 위한 중계기 선택 기법)

  • Choi, Yongyun;Lee, Jae Hong
    • Journal of Broadcast Engineering
    • /
    • v.21 no.1
    • /
    • pp.105-108
    • /
    • 2016
  • In this paper, a cooperative jamming network with multiple relays and multiple eavesdroppers is investigated. Among the relays, one best relay is selected to amplify and forward the signal to destination through two phases. To confuse eavesdroppers, the destination transmits a jamming signal in the first phase and the source transmits jamming signal in the second phase. Secrecy rate of this system is derived, and based on the available channel state information (CSI), relay selection schemes are proposed, respectively. Numerical results show that the performance of the proposed relay selection scheme outperforms than that of random relay selection scheme.

Housing Improvement Elements Depended on the Analysis of Urban Residents' Perceived Korean Housing Quality Related to Mental Health (거주자가 지각한 정신건강 관련 주거의 질 분석에 기초한 주거 개선요소)

  • Choi, Byungsook;Park, Jung-A
    • Journal of the Korean housing association
    • /
    • v.24 no.6
    • /
    • pp.189-197
    • /
    • 2013
  • The purpose of the study was to analyze the improvement elements depended on housing quality measurement tool related to mental health. The data for the analysis was collected through questionnaire survey method from November 1, 2012 to January 17, 2013, and the sample consisted of 720 respondents living in single detached houses, multi-families detached houses, apartments, and town houses in 4 cities, Seoul, Busan, Daejeon, and Kwangju. The data were analyzed using descriptive statistics. The results of improvement elements are as follows: 1) Pedestrian-threaten street from cars in physical safety 2) A secluded or dark spot and fear of walking at night in social security, 3) Indoor noise, outdoor noise, and evidence of abandoned trash heap/bottle in neighborhood in health & sanitation, 4) Illegal parking and heating control system in facility convenience, 5) Extra kitchen, number of bathrooms, and community spaces in space convenience, 6) Openness and spaciousness of indoor room, and satisfaction of house and neighborhood in comfort, 7) Management common/sharing space in maintenance, 8) Energy saving facility and environment friendly materials use in sustainability, 9) Burden on housing cost, asset value on house, and school district in economic value, 10) Reflection of residents style, surrounding building's number of layers, and neighborhood appearance of preference in housing environment image.

스마트그리드에서의 CPS (cyber-physical system) 시뮬레이션 구현을 위한 제반 연구이슈 및 방법론 검토

  • Kang, Dong-Joo;Kim, Huy-Kang
    • Review of KIISC
    • /
    • v.22 no.5
    • /
    • pp.62-72
    • /
    • 2012
  • 스마트그리드는 전력시스템과 이를 제어하기 위한 통신 인프라를 중심으로 다양한 시스템이 서로 통합되는 종합적인 플랫폼으로 이해할 수 있다. 기존에 각기 독립적으로 운영되는 시스템과 통신 인프라가 통합되기 시작하면서 다양한 상호작용이 파생되고 그로 인해 잠재적인 보안 측면의 위험성도 커지게 된다. 전통적인 전력시스템은 폐쇄적인 SCADA 네트워크를 기반으로 운영되었기 때문에 최소한의 보안강도가 보장되었지만, 스마트그리드 하에서는 개방형 통신망과 연계되면서, 기존의 사이버 보안 위협들이 전력시스템으로 유입하게 된다. 기존의 IT 시스템과는 달리 전력시스템과 같은 제어시스템은 물리적 작동과 공정이 수반되기 때문에 새로운 위험이 발생하기도 하고 기존의 위험이 증폭되기도 한다. 전력시스템에서는 가용성이 그 무엇보다 중요하기 때문에, 스마트그리드 체제하에서의 다양한 위협요인을 미리 파악하고 이에 대비한 계획을 수립함으로써, 그러한 가용성의 수준을 유지할 필요가 있다. 이를 위해서는 기존의 사이버 위협이 어떠한 경로를 통해 전력시스템에 영향을 미치게 되며 그로 인한 잠재적 위험이 얼마나 되는가를 평가할 필요가 있다. 그러나 스마트그리드는 아직까지 구축중인 미래형 시스템이고 누적된 과거 데이터가 없기 때문에 가상의 하드웨어 기반 테스트베드 내지 소프트웨어 기반의 시뮬레이션 모델을 통해 이를 사전적으로 테스트할 필요가 있다. 또한 스마트그리드는 서로 다른 IT 시스템과 물리적 설비들이 결합되는 복잡한 시스템이라는 측면에서, 잠재적으로 발생 가능한 다양한 위험을 분석하고 평가할 수 있는 모델의 수립이 요구된다. 본고에서는 그러한 CPS 기반 시뮬레이션 모델에 대한 현재의 연구동향을 검토하고, 향후 실질적으로 구현하기 위한 방안을 제안하고자 한다.

Exploiting Correlation Characteristics to Detect Covert digital communication

  • Huang, Shuhua;Liu, Weiwei;Liu, Guangjie;Dai, Yuewei;Tian, Wen
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.14 no.8
    • /
    • pp.3550-3566
    • /
    • 2020
  • As a widely used way to exfiltrate information, wireless covert channel (WCC) brings a serious threat to communication security, which enables the wireless communication process to bypass the authorized access control mechanism to disclose information. Unlike the covert channel on the network layer, wireless covert channels on the physical layer (WCC-P) is a new covert communication mode to implement and improve covert wireless communication. Existing WCC-P scheme modulates the secret message bits into the Gaussian noise, which is also called covert digital communication system based on the joint normal distribution (CJND). Finding the existence of this type of covert channel remains a challenging work due to its high undetectability. In this paper, we exploit the square autocorrelation coefficient (SAC) characteristic of the CJND signal to distinguish the covert communication from legitimate communication. We study the sharp increase of the SAC value when the offset is equal to the symbol length, which is caused by embedding secret information. Then, the SAC value of the measured sample is compared with the threshold value to determine whether the measured sample is CJND sample. When the signal-to-noise ratio reaches 20db, the detection accuracy can reach more than 90%.

A wireless sensor network approach to enable location awareness in ubiquitous healthcare applications

  • Singh, Vinay Kumar;Lim, Hyo-Taek;Chung, Wan-Young
    • Journal of Sensor Science and Technology
    • /
    • v.16 no.4
    • /
    • pp.277-285
    • /
    • 2007
  • In this paper, we outline the research issues that we are pursuing towards building of location aware environments for mainly ubiquitous healthcare applications. Such location aware application can provide what is happening in this space. To locate an object, such as patient or elderly person, the active ceiling-mounted reference beacons were placed throughout the building. Reference beacons periodically publish location information on RF and ultrasonic signals to allow application running on mobile or static nodes to study and determine their physical location. Once object-carried passive listener receives the information, it subsequently determines it's location from reference beacons. The cost of the system was reduced while the accuracy in our experiments was fairly good and fine grained between 7 and 12 cm for location awareness in indoor environments by using only the sensor nodes and wireless sensor network technology. Passive architecture used here provides the security of the user privacy while at the server the privacy was secured by providing the authentication using Geopriv approach. This information from sensor nodes is further forwarded to base station where further computation is performed to determine the current position of object.