• Title/Summary/Keyword: Protect Device

Search Result 385, Processing Time 0.025 seconds

A Countermeasure Technique for Attack of Reflection SSDP in Home IoT (홈 IoT에서 SSDP 반사체 공격에 대한 대응기법)

  • Park, Kwang-ok;Lee, Jong-Kun
    • Journal of Convergence for Information Technology
    • /
    • v.7 no.2
    • /
    • pp.1-9
    • /
    • 2017
  • Recently, the DDoS attack using the amplifier method makes it difficult to distinguish the normal traffic from the normal server and it is difficult to detect even the attack detection. Since the SSDP protocol is a common protocol widely used in IoT devices, it is used as a DDoS amplification attack. In this paper, we analyze the reflector attack of SSDP which is one of the DDoS and suggest a technical proposal to detect and defend against the attack by managing the Mac address of each device. Also, we propose a control structure to protect the reflection attack of SSDP in Home IoT. The efficiency of the proposed system has been verified by performing an experimental attack on the virtual environment.

Can prosthetic limbs made too quickly cause kidney damage?: a pilot study

  • Petrofsky, Jerrold S.;Browne, Mary;Jamshidi, Mahyar;Libo-on, Anthony;Lee, Haneul
    • Physical Therapy Rehabilitation Science
    • /
    • v.3 no.2
    • /
    • pp.119-124
    • /
    • 2014
  • Objective: The use of chemicals for building prosthetic sockets present the possibility of being hazardous and unsafe due to off-gassing. The purpose of the present study was to investigate if freshly made materials used in prosthetic sockets causes off-gassing that would penetrate the skin and cause damage to the kidneys or blood. Design: Cross-sectional study. Methods: In this research, the off-gassing effects during the initial curing process of styrene monomer, vinyl ester resin, epoxy methacrylate resin, benzene-1, 3-dimethaneamine, trimethylhexanedlamine, and paratertiarybutylphenol were analyzed. Acid detection strips were placed inside newly fabricated mock-prosthetic sockets and left overnight in a closed environment to find out if acid was present in the invisible fumes. The plastic was worn by 9 subjects and urinalysis was made after 48 hours to test for any kidney or blood toxicity of the resins. Results: After wearing the plastic cuff for 48 hours, the ratio of protein to creatinine in the urine was raised to an abnormal level in five out of nine subjects. Four out of the nine subjects showed normal protein to creatinine ratios after wearing the device. The results showed that damage to the kidney occurred from wearing the resins after curing in half of the subjects. Conclusions: It is very important to conduct patient intakes which includes the assessment of renal function. Off-gassing in vented chambers may be needed to protect both prosthetists and patients.

A Study on Reinforcement Method of Reinforced Soil Retaining Wall Through Field Experiment (보강토옹벽의 배부름현상 분석 및 보강 방법에 대한 실험적 연구)

  • Lee, Won-Hong;Mun, Byeong-Jo;Lee, Seuong-Yeol
    • Journal of the Korea institute for structural maintenance and inspection
    • /
    • v.23 no.4
    • /
    • pp.103-112
    • /
    • 2019
  • This study proposes a system to control the bulging phenomenon occurring in the reinforced earth retaining wall and to evaluate the reliability of the system by field experiment. In this study, drainage facilities were not installed in order to induce reinforcement earth retaining wall bulging, and the bulging was induced by rainfall. The induced bulging displacement exceeded the horizontal displacement criterion during the construction of FHWA. The retaining wall block was drilled and grouting was performed by inserting the nail into the drilling hole. The wire mesh is installed on the reinforcing surface and the head of the nail is connected horizontally so that the blocks of the reinforcing earth retaining wall can be supported with each other. In order to protect the reinforcements, the reinforcement surface was closed with shotcrete and a measuring device was installed to detect the progress of the displacement. After the reinforcement, the bulging were not found to progress any more, confirming the reliability of the system.

A Study on Security Requirments Analysis through Security Threat Modeling of Home IoT Appliance (Home IoT 가전의 보안위협모델링을 통한 보안요구사항 분석에 관한 연구)

  • Yun, Suk-Jin;Kim, Jungduk
    • The Journal of Society for e-Business Studies
    • /
    • v.24 no.2
    • /
    • pp.113-124
    • /
    • 2019
  • Today many companies are offering IoT-enabled products and place emphasis on security from the planning stage to protect their products and user information from external threats. The present security levels, however, remain low because the time and resources invested in developing security requirements for each device are far from enough to meet the needs of a wide range of IoT products. Nevertheless, vulnerabilities of IoT devices have been reported continuously, which calls for more detailed security requirements for home IoT devices. In this context, this research identified threats of home IoT systems by using Microsoft Threat Modeling Tool. It then suggested measures to enhance the security of home IoT devices by developing security assessment items through comparative analysis of the identified threats, domestic and global vulnerability assessment standards and related research. It also verified the effectiveness of the developed security requirements by testing them against the existing ones, and the results revealed the security requirements developed in this research proved to be more effective in identifying vulnerabilities.

The Development of Fitted Sports Wear for Safety and Protection Using Conductive Yarn Embroidery (전도사 자수를 이용한 안전보호용 밀착형 스포츠웨어 개발)

  • Park, Jinhee;Kim, Jooyong
    • Journal of Fashion Business
    • /
    • v.23 no.2
    • /
    • pp.156-169
    • /
    • 2019
  • The objective of this study was to develop lightweight, stretchable, tight-fit smart sportswear using the conductive yarns into the garment and demonstrating its usefulness. Sportswears with the ability to control LEDs with respect to lighting of the surrounding were developed by applying embroidery with conductive yarns to 2 types of men's T-shirts and 2 types of women's leggings pants for outdoor activities and exercise purposes. LEDs were applied to the front and back of men's T-shirts and to the rear of the waist of women's leggings. Men's T-shirts were printed where the LEDs were to be applied, and inside, they were embroidered with conductive threads on the hot-melt fabric to be attached, and then connected with LED. Women's pants were embroidered on the elastic band, in the form of a sine wave that gives it ability to stretch, and finally the elastic band was hidden inside the waistband. The operation of the light sensor in the dark provided the ability to protect joggers from night drivers or cyclists. LEDs were activated when the wearer turns on the fashionable device on his/her shoulder by pressing it. It was able to reduce the risk of accidents by giving recognizability to vehicles, bicycles, and athletes approaching or passing by at night, and securing safe distance from vehicles, etc. Internal embroidery technology had the same flexible and lightweight functions as ordinary clothing products, making it possible to apply to tight-fit smart T-shirts or leggings pants designs.

Design and Implementation of Secure UART based on Digital Signature and Encryption (디지털 서명과 암호화 기반 보안 UART의 설계와 구현)

  • Kim, Ju Hyeon;Joo, Young Jin;Hur, Ara;Cho, Min Kyoung;Ryu, Yeon Seung;Lee, Gyu Ho;Jang, Woo Hyun;Yu, Jae Gwan
    • Convergence Security Journal
    • /
    • v.21 no.2
    • /
    • pp.29-35
    • /
    • 2021
  • UART (Universal asynchronous receiver/transmitter) is a hardware device that converts data into serial format and transmits it, and is widely used for system diagnosis and debugging in most embedded systems. Hackers can access system memory or firmware by using the functions of UART, and can take over the system by acquiring administrator rights of the system. In this paper, we studied secure UART to protect against hacker attacks through UART. In the proposed scheme, only authorized users using the promised UART communication protocol are allowed to access UART and unauthorized access is not allowed. In addition, data is encrypted and transmitted to prevent protocol analysis through sniffing. The proposed UART technique was implemented in an embedded Linux system and performance evaluation was performed.

A Study on the Correction of Protection Relay of Temporary Electric Power Installations for Storage Tank (저장 탱크용 임시전력설비의 보호계전기 정정에 관한 연구)

  • Son, Seok-Geum
    • The Journal of Korea Institute of Information, Electronics, and Communication Technology
    • /
    • v.13 no.6
    • /
    • pp.562-567
    • /
    • 2020
  • In this paper, this is a study on the correction of protection relays to monitor temporary power facilities for storage tanks especially transformers to block and protect faults such as insulation breakdown. When an abnormality such as a short circuit or a ground fault occurs in the power system, it is important to detect this quickly cut off the device and equipment in which the fault occurred and separate it from the power system to correct the protection relay so that it does not interfere with power supply. In addition the fault current calculation that accurately applies the fault type and the cause of the fault for protection cooperation will be the most important factor in the correction of the protection relay. For protection coordination a study was conducted on the method of coordination for protection of power facility protection for storage tanks such as over current relay, ground over current relay, under voltage relay, and ground over voltage relay applied to temporary.

Shoulder-Surfing Resistant Password Input Method for Mobile Environment (모바일 환경에서 엿보기 공격에 강한 패스워드 입력방법)

  • Kim, Chang-Soon;Youn, Sun-Bum;Lee, Mun-Kyu
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.20 no.3
    • /
    • pp.93-104
    • /
    • 2010
  • The advent of various mobile devices and mobile services has caused diversification of information stored in a mobile device, e.g., SMS, photos, movies, addresses, e-mails, digital certificates, and so on. Because mobile devices are lost or stolen easily, user authentication is critical to protect the information stored in mobile devices. However, the current user authentication methods using Personal Identification Numbers (PINs) and passwords are vulnerable to Shoulder Surfing Attacks (SSAs), which enables an attacker to obtain user's information. Although there are already several SSA-resistant authentication methods in the literature, most of these methods lack of usability. Moreover, they are not suitable for use in mobile devices. In this paper, we propose a user friendly password input method for mobile devices which is secure against SSA. We also perform user tests and compare the security and usability of the proposed method with those of the existing password input methods.

Mutual Authentication and Key Establishment Protocol to Implement Secure M2M Communication Environments (안전한 M2M 통신 구축을 위한 상호인증 및 키 교환 프로토콜)

  • Eun, Sun-Ki;Jeon, Seo-Kwan;Ahn, Jae-Young;Oh, Soo-Hyun
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.20 no.1
    • /
    • pp.73-83
    • /
    • 2010
  • Recently, as IT technologies developed, communication technologies of a various forms that satisfied convenience of user are being researched. Among various research, unlike traditional forms of communication, M2M communication is getting attention that without any control or involvement of people to establish communication between devices. However, the M2M communication could more easily be exposed to many security problems such as data exposure, data theft, unauthorized change and delete and privacy. Therefore, in this paper, we derive security requirements and propose the M2M communication architecture that provide a secure M2M communication environment. Also, we propose a secure mutual authentication and key establishment protocol between a M2M device or gateway domain and a M2M network domain. The proposed protocol is secure against replay attack, impersonation attack and protect a user privacy and tracing.

Strategies for the Development of "Detailed Nondisclosure Standards" for Public Institutions (공공기관 '비공개 세부 기준' 개발 전략)

  • Hwang, Jinhyun;Lim, Jimin;Byeon, Wooyeong;Yim, Jinhee
    • Journal of Korean Society of Archives and Records Management
    • /
    • v.21 no.1
    • /
    • pp.117-139
    • /
    • 2021
  • "Detailed Nondisclosure Standards" of an institution include subject information and rationale that should not be disclosed by the institution. According to the Information Disclosure Act, such standards must be established in consideration of the nature of work, and continuous implementation is required. However, studies that reviewed the purpose and role of "Detailed Nondisclosure Standards" or the status of public institutions' development and operation of such standards were insufficient despite such standards being an indispensable tool in practice and a major device to protect the people's right to know. Therefore, this study introduces the strategies of the public institution and the research team to develop detailed standards for nondisclosure through the case of institution A. This will be of practical help to public institutions that intend to develop detailed nondisclosure standards in the future based on communication between institution A and the research team and sharing details during the project process.