• Title/Summary/Keyword: Protect Device

Search Result 385, Processing Time 0.025 seconds

A Practical Attack on In-Vehicle Network Using Repacked Android Applications (커넥티드 카 환경에서 안드로이드 앱 리패키징을 이용한 자동차 강제 제어 공격)

  • Lee, Jung Ho;Woo, Samuel;Lee, Se Young;Lee, Dong Hoon
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.26 no.3
    • /
    • pp.679-691
    • /
    • 2016
  • As vehicle started to contain many different communication devices, collecting external information became possible in IoT environment. In such environment, remotely controling vehicle is possible when vehicle information is obtained by looking in to vehicle network through smart device. However, android based smart device applications are vulnerable to malicious modulation and redistribution. Modulated android application can lead to vehicle information disclosure that could bring about vehicle control accident which becomes threat to drivers. furthermore, since vehicles today does not contain security methods to protect it, they are very vulnerable to security threats which can cause serious damage to users and properties. In this paper, many different vehicle management android applications that are sold in Google Play has been analyzed. With this information, possible threats that could happen in vehicle management applications are being analysed to prove the risks. the experiment is done on actual vehicle to prove the risks. Also, access control method to protect the vehicle against malicious actions that could happen through external network in IoT environment is suggested in the paper.

Real-time measurement of dentinal fluid flow during desensitizing agent application (상아질 지각과민 처치제의 적용 중에 일어나는 상아세관액 유동의 실시간 측정)

  • Kim, Sun-Young;Kim, Eun-Joo;Lee, In-Bog
    • Restorative Dentistry and Endodontics
    • /
    • v.35 no.5
    • /
    • pp.313-320
    • /
    • 2010
  • Objectives: The aim of this study was to examine changes in the dentinal fluid flow (DFF) during desensitizing agent application and to compare permeability after application among the agents. Materials and Methods: A Class 5 cavity was prepared to exposure cervical dentin on an extracted human premolar which was connected to a sub-nanoliter fluid flow measuring device (NFMD) under 20 cm water pressure. DFF was measured from before application of desensitizing agent (Seal&Protect, SP; SuperSeal, SS; BisBlock, BB; Gluma desensitizer, GL; Bi-Fluoride 12, BF) through application procedure to 5 min after application. Results: DFF rate after each desensitizing agent application was significantly reduced when compared to initial DFF rate before application (p < 0.05). SP showed a greater reduction in DFF rate than GL and BF did (p < 0.05). SS and BB showed a greater reduction in DFF rate than BF did (p < 0.05). Conclusions: Characteristic DFF aspect of each desensitizing agent was shown in NFMD during the application procedure.

A Study on Location Untraceability Service and Payment Protocol using Temporary Pseudonym in Mobile Communication Environments (이동통신 환경에서 임시 익명 아이디를 이용한 위치 불추적 서비스와 지불 프로토콜에 관한 연구)

  • 김순석;김성권
    • Journal of KIISE:Computer Systems and Theory
    • /
    • v.30 no.2
    • /
    • pp.78-92
    • /
    • 2003
  • In related to mobile communication environment, many researchers have studied problems concerning current locations of mobile users and exposure of their movements in the privacy aspect so far [1,2,3,4,5,6,7,8,9]. Among them, Kesdogan and Pfitzmann [3,6] proposed effective solutions using temporary pseudonym identification, called TP(Temporary Pseudonym ) to solve them. After that, Kesdogan et al. proposed an improved method protecting mobile users from some types of attacks of network providers in [8]. However, among their methods, in particular the method, attaching the other new device (so-called Reachability Manager) to system against active attack of network providers, is alterative rather than practical and is not clear. Moreover, it requires the other cost and overhead. Therefore we propose a practical method against active attack of network providers without attaching new device in original environments. The basie idea of proposed method is to protect a fraud act of network provider as a inside user by exchanging a secret information, which only users and network providers know, via network provider between mobile user and the trusted third party (so-called Trust Device). Moreover, we introduce a new payment protocol which applied our method.

A Fundamental Study for Design of Electric Energy Harvesting Device using PZT on the Road (도로용 압전발전체 시험모듈 설계를 위한 기초 실험 연구)

  • Lee, Jae-Jun;Ryu, Seung-Ki;Moon, Hak-Yong;Kwon, Soo-Ahn
    • International Journal of Highway Engineering
    • /
    • v.13 no.4
    • /
    • pp.159-166
    • /
    • 2011
  • Green house gas emissions are increasing as development of the industrial economy of the international community. Many countries in the world are endeavoring to reduce green house gas emissions under severe climate change. In order to protect grobal warming, government is trying to reduce green gas emissions under "Low Carbon Green Growth Policy" and investing climiate-firendly industries such as renewable energy harvesting. Renewable energy has been rapidly developing as a result of investment for development technology of using natural energy such as solar, wind, tidal, etc. There are lots of waste energy in the road space. However, nobody is not interested in waste energy from the road space. This paper present a fundamentally experimental study of energy harvesting technique to use waste energy in the road. The waste energy in the road is covered a pressure and impact of vehicles on the road, the radiant heat from asphalt pavement, road noise and vibration etc. In this study, an energy harvesting device using piezoelectric element is proposed and various tests are conducted to investigate a characteristic of this device as function of impact loading based on piezoelectric effect behavior. This paper shows the energy harvesting results of the device using domestic piezoelectirc element as a function of impact load size and pavement types.

A Study on the Security Checklist Improvements to improve the Security in the Mobile Applications Development (모바일 어플리케이션 개발에서의 보안성 향상을 위한 보안 점검항목 개선에 관한 연구)

  • Shin, Jun-Yuop;Kim, Dong-Soo;Han, Ki-Jun;Kim, Hee-Wan
    • Journal of Digital Convergence
    • /
    • v.12 no.8
    • /
    • pp.113-127
    • /
    • 2014
  • The use of mobile devices offers a variety of services to the individuals and companies. On the other hand, security threats and new mobile security threats that exist in IT infrastructure to build the environment for mobile services are present at the same time. Services such as mobile and vaccine management services, such as MDM (Mobile Device Management) has attracted a great deal of interest in order to minimize the threat of security in mobile environment. These solutions can not protect an application that was developed for the mobile service from the threat of vulnerability of mobile application itself. Under these circumstances, in this paper, we proposed mobile application security checklists based on application security review items in order to prevent security accidents that can occur in a mobile service environment. We collected and analyzed Android applications, we performed a total inspection of the applications for verification of the effectiveness of the check items. And we checked that the check items through a survey of experts suitability was verified.

RFID-based Authentication Protocol for Implantable Medical Device (체내삽입장치에 RFID 기술을 적용한 인증 프로토콜)

  • Jeong, Yoon-Su
    • Journal of Digital Convergence
    • /
    • v.10 no.2
    • /
    • pp.141-146
    • /
    • 2012
  • U-healthcare, which grafted advanced IT technology onto medical technology, is in the limelight because it can provide medical services at anytime and anywhere. U-healthcare system applied RFID technology for Implantable Medical Device (IMD), but patient's biometric information can be easily exposed to third parties. In this article, RFID-based U-healthcare authentication protocol is proposed to prevent illegal usage for personal biometric information exposed to the third patty. The proposed protocol guarantees patients' biometric information integrity as compounding random numbers between administrators and hospital/clinic managers, and uses continuous number SEQ and time stamp T to synchronize IMD/administrators and administrators/hospital managers. Also, to protect user's privacy from the third party, patients' biometric information can be safely guarded by managing patients' security identifiers by administrators.

The Study on Design and Implementation of MSEC-based Group Key Management Protocol for Corporate Secret Distribution (기업비밀유통을 위한 MSEC 기반 그룹 키 관리 프로토콜 설계와 구현 연구)

  • Choi, Cheong-Hyeon
    • Journal of Internet Computing and Services
    • /
    • v.11 no.6
    • /
    • pp.87-110
    • /
    • 2010
  • Recently competitive Korean companies are suffered from financial loss due to illegal exposure of their own proprietary know-how secrets, since it is difficult to watch hidden illegal channels to leak them due to their digitalization. Today the DRM-based system designed to protect such secrets is insufficient to prevent it, since DRM-based protection system cannot defend the intelligent robbery of secrets, in special, employee's robbery. The MSEC is much appropriate to secure secrets against employee's robbery. Our paper notes that IGMP, MSEC and SNMP can work easily together to realize secure system that satisfy strong security condition for prevention from leaking secrets. Since the previous research was on the architectural design for prevention of illegal exposure, this paper proposes the efficient protocol based on MSEC protocol. Our protocol satisfies the strong security conditions that the principles that the secret should be stored/distributed only in an encrypted shape, and should be separated physically from its encryption key, and should be carried in registered mobile storage separate from its processing device, and should be verified in terms of both user and device. Thus this paper proposes both the protocol for secret document distribution and its group key management.

A Selection of Artificial Surveillance Zone through the Spatial Features Analysis of Crime Occurrence Place (범죄발생지점의 공간적 특성분석을 통한 인위적 감시지역의 선정)

  • Kim, Dong-Moon;Park, Jae-Kook
    • Journal of Korean Society for Geospatial Information Science
    • /
    • v.18 no.3
    • /
    • pp.83-90
    • /
    • 2010
  • In modern society, there has been an increase in needs to protect the life and property of the people, because the number of various crimes is on the increase due to the sudden and complicated changes of the urban environment. For the needs, security persons in the urban area are expanding the role and skill of police for more effective crime prevention and surveillance, although the number of policeman/woman is insufficient and their tasks are hard. Recently, a system to observe and prevent crime in effective has been introduced by using such an artificial surveillance device as CCTV to monitor focusing on one area for 24 hours. However, the system brings such problems as the insufficiency of systematic criteria to install surveillance device and the invasion of privacy. Therefore, in this study, artificial surveillance zones to monitor crimes are selected by applying spatial features between artificial surveillance devices including CCTV and crime occurrence place, and using GIS spatial analysis techniques. As a result of selecting, it's found that the number of CCTV is absolutely insufficient and spatial distribution is not fully considered in the existing location of installed CCTV.

Design of DRM System for Secure Contents Transfer in Home Domain (홈 도메인에서 안전한 콘텐츠 전송을 위한 DRM 시스템의 설계)

  • Lee, Chang-Bo;Kim, Jung-Jae;Moon, Ju-Young;Lee, Kyung-Seok;Jun, Moon-Seog
    • The KIPS Transactions:PartC
    • /
    • v.14C no.3 s.113
    • /
    • pp.221-228
    • /
    • 2007
  • For the usage of the different standard technology among DRM vendors, the DRM technologies in today could not guarantee the interoperability between the digital contents and digital devices. While users have been guaranteed the protection of contents, they have to put up with the limitation and inconvenience. The Superdistribution methods that InterTrust has proposed is the content distribution technology which is possible to use the content only by the user authentication with the license regardless of the acquisition of the DRM contents. However, it need a additional license with re-authentication from DRM server when the original contents need to be moved to other devices from the own device. In this paper, to reduce the inconveniences of re-authentication and re-issue procedures of the license and continually to protect the rights of contents on the offline, we propose the DRM system that creates domain between home devices and enable users to freely transfer contents with the domain.

MOUTHGUARD FOR RELIEF OF REPEATED CLENCHING STRESS TO CERVICAL RESTORATIONS DURING EXERCISES (운동시의 습관적인 이 악물기가 치경부 수복물에 가해지는 스트레스를 분산하기 위한 마우스가드의 사용)

  • Yoon, Sung-Young;Song, Chang-Kyu;Park, Se-Hee;Kim, Jin-Woo;Cho, Kyung-Mo
    • Restorative Dentistry and Endodontics
    • /
    • v.35 no.1
    • /
    • pp.20-23
    • /
    • 2010
  • Mouthguards were used to protect boxers from lip lacerations and other soft tissue injuries in the late 19th century. Now they are used various parts of dental treatment, which are sports protective aid, bleaching tray, orthodontic retainer, implant insertion guide tray, splint and so on. Repeated dislodgement of Class V restoration due to habitual clenching stress should be restored with stress control. Mouthguard can be used as stress relief device. This case describes methods that can relieve occlusal force to teeth by using mouthguard. Satisfactory results can be obtained by using mouthguard for retention of repeated dislodgement Class V restorations. If patients suffered from repeated restorations of Class V due to clenching, mouthguard can be used additional device to relieve the occlusal stress in conservative dentistry.