• Title/Summary/Keyword: Private Location Information

Search Result 112, Processing Time 0.023 seconds

Dementia Patient Wandering Behavior and Anomaly Detection Technique through Biometric Authentication and Location-based in a Private Blockchain Environment (프라이빗 블록체인 환경에서 생체인증과 위치기반을 통한 치매환자 배회행동 및 이상징후 탐지 기법)

  • Han, Young-Ae;Kang, Hyeok;Lee, Keun-Ho
    • Journal of Internet of Things and Convergence
    • /
    • v.8 no.5
    • /
    • pp.119-125
    • /
    • 2022
  • With the recent increase in dementia patients due to aging, measures to prevent their wandering behavior and disappearance are urgently needed. To solve this problem, various authentication methods and location detection techniques have been introduced, but the security problem of personal authentication and a system that can check indoor and outdoor overall was lacking. In order to solve this problem, various authentication methods and location detection techniques have been introduced, but it was difficult to find a system that can check the security problem of personal authentication and indoor/outdoor overall. In this study, we intend to propose a system that can identify personal authentication, basic health status, and overall location indoors and outdoors by using wristband-type wearable devices in a private blockchain environment. In this system, personal authentication uses ECG, which is difficult to forge and highly personally identifiable, Bluetooth beacon that is easy to use with low power, non-contact and automatic transmission and reception indoors, and DGPS that corrects the pseudorange error of GPS satellites outdoors. It is intended to detect wandering behavior and abnormal signs by locating the patient. Through this, it is intended to contribute to the prompt response and prevention of disappearance in case of wandering behavior and abnormal symptoms of dementia patients living at home or in nursing homes.

Attacks on and Countermeasures for an RFID Mutual Authentication Scheme in Pervasive Computing Environment

  • Mohaisen, Abedelaziz;Chang, Ku-Young;Hong, Do-Won
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.5 no.9
    • /
    • pp.1684-1697
    • /
    • 2011
  • We show that two protocols for RFID mutual authentication in pervasive computing environments, recently proposed by Kang et al, are vulnerable to several attacks. First, we show these protocols do not preserve the privacy of users' location. Once a tag is authenticated successfully, we show several scenarios where legitimate or illegitimate readers can trace the location of that tag without any further information about the tag's identifier or initial private key. Second, since the communication between readers and the database takes place over an insecure communication channel and in the plaintext form, we show scenarios where a compromised tag can gain access to confidential information that the tag is not supposed get access to. Finally, we show that these protocols are also vulnerable to the replay and denial-of-service attacks. While some of these attacks are due to simple flaws and can be easily fixed, others are more fundamental and are due to relaxing widely accepted assumptions in the literature. We examine this issue, apply countermeasures, and re-evaluate the protocols overhead after taking these countermeasures into account and compare them to other work in the literature.

An Individual Privacy Protection Design for Smart Tourism Service based on Location (위치 기반 스마트 관광 서비스를 위한 개인 프라이버시 보호 설계)

  • Cho, Cook-Chin;Jeong, Eun-Hee
    • The Journal of Korea Institute of Information, Electronics, and Communication Technology
    • /
    • v.9 no.5
    • /
    • pp.439-444
    • /
    • 2016
  • This paper proposes the technique to protect the privacy of those who uses Smart Tourism Service based on location. The proposed privacy protection technique (1) generates a shared private key, OTK(One Time Key) without information exchanging Users with a Tourism Server and provides Users and a Tourism Server with message confidentiality by encrypting data with the key, (2) concatenates users' ID, login time(timestamp), and randomly-generated nonce, generates OTK by hashing with a hash function, encrypts users' location information and query by using the operation of OTK and XOR and provides Users and a Tourism Server with message confidentiality by sending the encrypted result. (3) protects a message replay attack by adding OTK and timestamp. Therefore, this paper not only provides data confidentiality and users' privacy protection but also guarantees the safety of location information and behavior pattern data.

Internet Push Service Using Tunneling Technology (터널링기술을 이용한 인터넷 푸쉬 서비스)

  • Oh, Jong-Taek
    • The Journal of The Korea Institute of Intelligent Transport Systems
    • /
    • v.7 no.4
    • /
    • pp.130-135
    • /
    • 2008
  • Broadcasting services using Internet and Internet protocol have been developed actively. In this paper, push service technologies based on tunneling protocol and for the case of base stations using private IP addresses are proposed. This could be very proper to the broadcasting services for location & traffic information and disaster relief.

  • PDF

Study on the restoration of Soswaewon Garden's Goam-Jeongsa and Boohwondang buildings (소쇄원 고암정사와 부훤당의 복원적 고찰)

  • Cheon, Deuk-youm;Choi, Jung-mee;Kim, Dyeon-jin
    • Journal of the Architectural Institute of Korea Planning & Design
    • /
    • v.34 no.4
    • /
    • pp.103-111
    • /
    • 2018
  • The Soswaewon Garden, which was constructed by Yang San-Bo around 1520, is a private traditional garden in Korea. Soswaewon Garden has long been and still is the focus of continuous research. However, relatively few studies have been conducted on the restoration of buildings that were lost in the past. The Goam-Jeongsa and Boohwondang buildings, which were lost in 1597 during the Japanese invasion, were restored in 1614 and depicted in a picture of Soswaewon Garden in 1755. However, they eventually disappeared and no longer exist in the present. Therefore, the restoration of these two buildings is considered an urgent task. This research aims to search for the original location of these buildings and estimate their size and shape in terms of physical space. Several years ago, an estimation of the building site was carried out, providing a stepping stone on this matter. This can be studied through "Soswaewon's 48 quatrains with five Chinese characters in each line," "Soswaewon-sasil," and "Soswaewon's drawing." Some parts of the shape of Soswaewon also appear in the "Yuseoseokrok," which is helpful. Thus, in this research, information on the Goam-Jeongsa and Boowondang buildings appearing in research results and literature to date are collectively analyzed. The location and architectural features of both buildings are identified by focusing on excavations. Also, for the purpose of restoration planning, base data on the location, size, and shape of both buildings are presented. In line with this process, a valid restoration plan is presented by analyzing the abovementioned historical research materials and comparing empirical data, such as excavation results.

An Ethnography on Educational Activities of Three Middle Schools in Rural Area (농산어촌지역 교육의 특성과 문제점 분석 -세 학교에 대한 문화기술적 접근-)

  • Lee, Doo-Hyoo
    • Journal of Agricultural Extension & Community Development
    • /
    • v.18 no.3
    • /
    • pp.435-483
    • /
    • 2011
  • This paper was to study characteristics of school types based on classification of rural areas. This study tried to provide basic data for implementing the development of rural education policy for the community unit by classifying and analyzing administrative districts. For the purpose, the researcher carried out literature reviews and selected three schools considering the gaps in size and location of rural community. The researcher interviewed teachers and parents, to gather information about rural education, and conducted participant observation on educational activities. As a result, this study showed each rural school has its own distinct characteristics by the school types corresponding to each rural community. Characteristics with school types were influenced by school location, possible migration into the cities, possible opportunities of private tutoring, school size, social class distribution, socio-economic status, dwelling pattern of school teachers. In conclusion, it is important that the educational policies for rural area consider the different characteristics of rural schools.

The Standardization of Location Data for Location-based Services (위치기반 경로안내 서비스를 위한 위치 데이터 표준안 개발)

  • Jeong, Yeon-Jeong;Park, Sin-Hyeong;Park, Chang-Ho;Kim, Chang-Ho
    • Journal of Korean Society of Transportation
    • /
    • v.27 no.2
    • /
    • pp.73-82
    • /
    • 2009
  • Location-based concierge services (LBCS) are considered to be one of the main service functions provided in a city in ubiquitous technology spaces. A "Ubiquitous City" is defined as a city in which both public and private services can be delivered and received anywhere and anytime. One of the key elements that make location-based concierge services successful is the interoperability of location data. Currently, several existing technologies could provide LBCS including car navigation services and ubiquitous computing. However, lack of standardized structure for location data makes it impossible for heterogeneous technologies to be able to deliver uniform LBCS. The purpose of this paper is to develop standardized locational data structure so that heterogeneous technologies could provide efficient LBCS to all users of the various transportation modes.

Analysis and Demonstration of GPS Spoofing Attack: Based on Commercial Drones (GPS 스푸핑 공격 취약점 분석 및 실증: 상용 드론을 대상으로)

  • Jinseo Yun;Minjae Kim;Kyungroul Lee
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.34 no.3
    • /
    • pp.431-437
    • /
    • 2024
  • Drones in the contemporary landscape have transcended their initial public utility, expanding into various industries and making significant inroads into the private sector. The majority of commercially available drones are presently equipped with GPS receivers to relay location signals from artificial satellites, aiming to inform users about the drone's whereabouts. However, a notable drawback arises from the considerable distance over which these location signals travel, resulting in a weakened signal intensity. This limitation introduces vulnerabilities, allowing for the possibility of location manipulation and jamming attacks if the drone receives a stronger signal than the intended location signal from satellites. Thus, this paper focuses on the safety assessment of drones relying on GPS-based location acquisition and addresses potential vulnerabilities in wireless communication scenarios. Targeting commercial drones, the paper analyzes and empirically demonstrates the feasibility of GPS spoofing attacks. The outcomes of this study are anticipated to serve as foundational experiments for conducting more realistic vulnerability analysis and safety evaluations.

A Method for Detection of Private Key Compromise (서명용 개인키 노출 탐지 기법)

  • Park, Moon-Chan;Lee, Dong-Hoon
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.24 no.5
    • /
    • pp.781-793
    • /
    • 2014
  • A Public Key Infrastructure (PKI) is security standards to manage and use public key cryptosystem. A PKI is used to provide digital signature, authentication, public key encryption functionality on insecure channel, such as E-banking and E-commerce on Internet. A soft-token private key in PKI is leaked easily because it is stored in a file at standardized location. Also it is vulnerable to a brute-force password attack as is protected by password-based encryption. In this paper, we proposed a new method that detects private key compromise and is probabilistically secure against a brute-force password attack though soft-token private key is leaked. The main idea of the proposed method is to use a genuine signature key pair and (n-1) fake signature key pairs to make an attacker difficult to generate a valid signature with probability 1/n even if the attacker found the correct password. The proposed method provides detection and notification functionality when an attacker make an attempt at authentication, and enhances the security of soft-token private key without the additional cost of construction of infrastructure thereby extending the function of the existing PKI and SSL/TLS.

Military Logistics Consolidation Center Location Problem : Modeling and Analysis (군 통합 물류센터의 최적 위치 결정)

  • Sim, Seungbae;Jang, Jihong;Jung, Hosang;Jeong, Bongju
    • Journal of Korean Institute of Industrial Engineers
    • /
    • v.39 no.6
    • /
    • pp.587-598
    • /
    • 2013
  • In Korea military (KM), various military supplies are distributed to individual military units via three different multi-tier supply networks owned and operated by army, navy, and air force, respectively. Under the current supply networks, the chances for the occurrence of delayed supply, undersupply, and oversupply increase, and supply redundancy also can become a problem. Thus, KM is now trying to improve its current multi-tier supply networks by constructing logistics consolidation centers. Private companies operate logistics consolidation centers to effectively manage various types of inventories before delivering them to final customers. In this paper, we newly propose a mathematical model for building the optimized military supply network considering adopting the military logistics consolidation centers. Based on the real situation of KM, the proposed model was validated in terms of its feasibility, and it seems that the outcome (the location of the military logistics consolidation centers) of the proposed model can be one of the good alternatives for KM.