• Title/Summary/Keyword: Protect Device

Search Result 385, Processing Time 0.023 seconds

Design and implementation of improved authentication mechanism base on mobile DRM using blockchain (블록체인을 이용한 모바일 DRM 기반 개선된 인증 메커니즘 설계 및 구현)

  • Jeon, Jinl-Oh;Seo, Byeong-Min
    • Journal of Digital Convergence
    • /
    • v.19 no.4
    • /
    • pp.133-139
    • /
    • 2021
  • Due to the rapid progress in network technology, many research on content security technologies is also being conducted in the mobile digital content sector. In the meantime, content protection has been immersed in preventing illegal copying, certifying, and issuance/management certificates, but still have many vulnerabilities in managing or authenticating confidential information. This study aims to strengthen confidential information about content based on dual management of content download rights through mobile phone numbers or device numbers. It also protect replay-attack by building a secure mobile DRM system where digital content is safely distributed based on a three-stage user authentication process. In addition, blockchain-based content security enhancements were studied during the primary/secondary process for user authentication for the prevention of piracy and copyright protection. In addition, the client authentication process was further improved through three final stages of authorization in the use of illegal content, considering that legitimate users redistributed their content to third-party.

Sintering process optimization of ZnO varistor materials by machine learning based metamodel (기계학습 기반의 메타모델을 활용한 ZnO 바리스터 소결 공정 최적화 연구)

  • Kim, Boyeol;Seo, Ga Won;Ha, Manjin;Hong, Youn-Woo;Chung, Chan-Yeup
    • Journal of the Korean Crystal Growth and Crystal Technology
    • /
    • v.31 no.6
    • /
    • pp.258-263
    • /
    • 2021
  • ZnO varistor is a semiconductor device which can serve to protect the circuit from surge voltage because its non-linear I-V characteristics by controlling the microstructure of grain and grain boundaries. In order to obtain desired electrical properties, it is important to control microstructure evolution during the sintering process. In this research, we defined a dataset composed of process conditions of sintering and relative permittivity of sintered body, and collected experimental dataset with DOE. Meta-models can predict permittivity were developed by learning the collected experimental dataset on various machine learning algorithms. By utilizing the meta-model, we can derive optimized sintering conditions that could show the maximum permittivity from the numerical-based HMA (Hybrid Metaheuristic Algorithm) optimization algorithm. It is possible to search the optimal process conditions with minimum number of experiments if meta-model-based optimization is applied to ceramic processing.

Collaborative Modeling of Medical Image Segmentation Based on Blockchain Network

  • Yang Luo;Jing Peng;Hong Su;Tao Wu;Xi Wu
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.17 no.3
    • /
    • pp.958-979
    • /
    • 2023
  • Due to laws, regulations, privacy, etc., between 70-90 percent of providers do not share medical data, forming a "data island". It is essential to collaborate across multiple institutions without sharing patient data. Most existing methods adopt distributed learning and centralized federal architecture to solve this problem, but there are problems of resource heterogeneity and data heterogeneity in the practical application process. This paper proposes a collaborative deep learning modelling method based on the blockchain network. The training process uses encryption parameters to replace the original remote source data transmission to protect privacy. Hyperledger Fabric blockchain is adopted to realize that the parties are not restricted by the third-party authoritative verification end. To a certain extent, the distrust and single point of failure caused by the centralized system are avoided. The aggregation algorithm uses the FedProx algorithm to solve the problem of device heterogeneity and data heterogeneity. The experiments show that the maximum improvement of segmentation accuracy in the collaborative training mode proposed in this paper is 11.179% compared to local training. In the sequential training mode, the average accuracy improvement is greater than 7%. In the parallel training mode, the average accuracy improvement is greater than 8%. The experimental results show that the model proposed in this paper can solve the current problem of centralized modelling of multicenter data. In particular, it provides ideas to solve privacy protection and break "data silos", and protects all data.

Analyses of Security Issues and Vulnerability for Smart Home Network based on Internet of Things (사물인터넷 기반의 스마트 홈 네트워크에서의 취약점 및 보안 이슈 분석)

  • Jung Tae Kim
    • The Journal of the Convergence on Culture Technology
    • /
    • v.9 no.3
    • /
    • pp.707-714
    • /
    • 2023
  • The Internet of Things, which is the key factor of the 4th industrial revolution, are apt to apply to many systems. The existing security mechanism cannot be realized with limited resources such as low capacity of devices and sensors. In order to apply IoT system, a new structure and ultra-lightweight encryption is required. In this paper, we analyzed security issues that can operate in Internet-based smart home networks, and to solve the critical issues against these attacks, technologies for device protection between heterogeneous devices. Security requirements are required to protect from attacks. Therefore, we analyzed the demands and requirements for its application by analyzing the security architecture and features in smart home network.

A Study on Base Isolation Performance and Phenomenological Model of E-Shape Steel Hysteretic Damper (E-Shape 강재이력댐퍼의 수치모델과 기초격리구조물의 지진응답)

  • Hwang, Inho;Ju, Minkwan;Sim, Jongsung;Lee, Jong Seh
    • KSCE Journal of Civil and Environmental Engineering Research
    • /
    • v.28 no.5A
    • /
    • pp.685-690
    • /
    • 2008
  • Recently, as large structures become lighter and more flexible, the necessity of structural control for reducing excessive displacement and acceleration due to seismic excitation is increased. As a means to minimize seismic damages, various base isolation systems are adopted or considered for adoption. In this study, a base isolation system using hysteretic damper is shown to effectively protect structures against earthquakes. A mechanical model is determined that can effectively portray the behavior of a typical E-shape device. Comparison with experimental results for a hysteretic damper indicates that the model is accurate over a wide range of operating conditions and adequate for analysis. The seismic performance of hysteretic dampers are studied and compared with the conventional systems as a base isolation system. A five-story building is modeled and the seismic performance of the systems subjected to three different earthquake is compared. The results show that the hysteretic damper system can provide superior protection than the other systems for a wide range of ground motions.

DSP based Real-Time Fault Determination Methodology using Artificial Neural Network in Smart Grid Distribution System (스마트 그리드 배전계통에서 인공신경회로망을 이용한 DSP 기반 실시간 고장 판단 방법론 기초 연구)

  • Jin-Eun Kim;Yu-Rim Lee;Jung-Woo Choi;Byung-Hoon Roh;Yun-Seok Ko
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.18 no.5
    • /
    • pp.817-826
    • /
    • 2023
  • In this paper, a fault determination methodology based on an artificial neural network was proposed to protect the system from faults on the lines in the smart grid distribution system. In the proposed methodology, first, it was designed to determine whether there is a low impedance line fault (LIF) based on the magnitude of the current RMS value, and if it is determined to be a normal current, it was designed to determine whether a high impedance ground fault (HIF) is present using Normal/HIF classifier based on artificial neural network. Among repetitive DSP module-based algorithm verification tests, the normal/HIF classifier recognized the current waveform as normal and did not show reclosing operation for the cases of normal state current waveform simulation test where the RMS value was smaller than the minimum operating current value. On the other hand, for the cases of LIF where RMS value is greater than the minimum operating current value, the validity of the proposed methodology could be confirmed by immediately recognizing it as a fault state and showing reclosing operation according to the prescribed procedure.

LockPickFuzzer: Exploring Vulnerabilities in Android Lock Screen Mechanisms through ADB-Based Fuzzing (LockPickFuzzer: ADB 기반 퍼징 기법을 활용한 안드로이드 잠금 화면 메커니즘의 취약점 탐색)

  • Daehoon Ko;Hyoungshick Kim
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.34 no.4
    • /
    • pp.651-666
    • /
    • 2024
  • Android devices employ lock screens with various authentication methods to protect user data. However, even with the lock screen active, the device can be accessed via the Android Debug Bridge(ADB), a powerful development tool that controls devices connected through USB. In this paper, we explore methods to bypass the lock screen security mechanism by leveraging the characteristics of ADB. To achieve this, we analyze ADB commands to categorize those that can severely impact the Android system and propose LockPickFuzzer, a fuzzing test tool that automatically explores ways to combine these commands to disable lock screen security. To demonstrate LockPickFuzzer's ability to detect security vulnerabilities using ADB, we conducted experiments on the Galaxy S23 and Pixel 8, both running Android 14. The results revealed two ADB command combinations that could either steal authentication information or bypass the lock screen. We submitted a report on these discovered vulnerabilities to the Samsung security team and received official acknowledgment (SVE-2023-1344) from Samsung Electronics for one ADB command combination that can be reproduced on user devices. LockPickFuzzer is a practical tool that operates automatically without user intervention and is expected to contribute to the effective detection of security vulnerabilities caused by ADB command combinations on Android devices.

Q-Learning Based Method to Secure Mobile Agents and Choose the Safest Path in a IoT Environment

  • Badr Eddine Sabir;Mohamed Youssfi;Omar Bouattane;Hakim Allali
    • International Journal of Computer Science & Network Security
    • /
    • v.24 no.10
    • /
    • pp.71-80
    • /
    • 2024
  • The Internet of Things (IoT) is an emerging element that is becoming increasingly indispensable to the Internet and shaping our current understanding of the future of the Internet. IoT continues to extend deeper into the daily lives of people, offering distributed and critical services. In contrast with current Internet, IoT depends on a dynamic architecture where physical objects with embedded sensors will communicate via cloud to send and analyze data [1-3]. Its security troubles will surely impinge all aspects of civilization. Mobile agents are widely used in the context of the IoT and due to the possibility of transmitting their execution status from one device to another in an IoT network, they offer many advantages such as reducing network load, encapsulating protocols, exceeding network latency, etc. Also, cryptographic technologies, like PKI and Blockchain technology, and Artificial Intelligence are growing rapidly allowing the addition of an approved security layer in many areas. Security issues related to mobile agent migration can be resolved with the use of these technologies, thus allowing increased reliability and credibility and ensure information collecting, sharing, and processing in IoT environments, while ensuring maximum autonomy by relying on the AI to allow the agent to choose the most secure and optimal path between the nodes of an IoT environment. This paper aims to present a new model to secure mobile agents in the context of the Internet of Things based on Public Key Infrastructure (PKI), Ethereum Blockchain Technology and Q-learning. The proposed model provides a secure migration of mobile agents to ensure security and protect the IoT application against malevolent nodes that could infiltrate these IoT systems.

Electronic Roll Book using Electronic Bracelet.Child Safe-Guarding Device System (전자 팔찌를 이용한 전자 출석부.어린이 보호 장치 시스템)

  • Moon, Seung-Jin;Kim, Tae-Nam;Kim, Pan-Su
    • Journal of Intelligence and Information Systems
    • /
    • v.17 no.4
    • /
    • pp.143-155
    • /
    • 2011
  • Lately electronic tagging policy for the sexual offenders was introduced in order to reduce and prevent sexual offences. However, most sexual offences against children happening these days are committed by the tagged offenders whose identities have been released. So, for the crime prevention, we need measures with which we could minimize the suffers more promptly and actively. This paper suggests a new system to relieve the sexual abuse related anxiety of the children and solve the problems that electronic bracelet has. Existing bracelets are only worn by serious criminals, and it's only for risk management and positioning, there is no way to protect the children who are the potential victims of sexual abuse and there actually happened some cases. So we suggest also letting the students(children) wear the LBS(Location Based Service) and USN(Ubiquitous Sensor Network) technology based electronic bracelets to monitor and figure out dangerous situations intelligently, so that we could prevent sexual offences against children beforehand, and while a crime is happening, we could judge the situation of the crime intelligently and take swift action to minimize the suffer. And by checking students' attendance and position, guardians could know where their children are in real time and could protect the children from not only sexual offences but also violent crimes against children like kidnapping. The overall system is like follows : RFID Tag for children monitors the approach of offenders. While an offender's RFID tag is approaching, it will transmit the situation and position as the first warning message to the control center and the guardians. When the offender is going far away, it turns to monitoring mode, and if the tag of the child or the offender is taken off or the child and offender stay at one position for 3~5 minutes or longer, then it will consider this as a dangerous situation, then transmit the emergency situations and position as the second warning message to the control center and the guardians, and ask for the dispatch of police to prevent the crime at the initial stage. The RFID module of criminals' electronic bracelets is RFID TAG, and the RFID module for the children is RFID receiver(reader), so wherever the offenders are, if an offender is at a place within 20m from a child, RFID module for children will transmit the situation every certain periods to the control center by the automatic response of the receiver. As for the positioning module, outdoors GPS or mobile communications module(CELL module)is used and UWB, WI-FI based module is used indoors. The sensor is set under the purpose of making it possible to measure the position coordinates even indoors, so that one could send his real time situation and position to the server of central control center. By using the RFID electronic roll book system of educational institutions and safety system installed at home, children's position and situation can be checked. When the child leaves for school, attendance can be checked through the electronic roll book, and when school is over the information is sent to the guardians. And using RFID access control turnstiles installed at the apartment or entrance of the house, the arrival of the children could be checked and the information is transmitted to the guardians. If the student is absent or didn't arrive at home, the information of the child is sent to the central control center from the electronic roll book or access control turnstiles, and look for the position of the child's electronic bracelet using GPS or mobile communications module, then send the information to the guardians and teacher so that they could report to the police immediately if necessary. Central management and control system is built under the purpose of monitoring dangerous situations and guardians' checking. It saves the warning and pattern data to figure out the areas with dangerous situation, and could help introduce crime prevention systems like CCTV with the highest priority. And by DB establishment personal data could be saved, the frequency of first and second warnings made, the terminal ID of the specific child and offender, warning made position, situation (like approaching, taken off of the electronic bracelet, same position for a certain time) and so on could be recorded, and the data is going to be used for preventing crimes. Even though we've already introduced electronic tagging to prevent recurrence of child sexual offences, but the crimes continuously occur. So I suggest this system to prevent crimes beforehand concerning the children's safety. If we make electronic bracelets easy to use and carry, and set the price reasonably so that many children can use, then lots of criminals could be prevented and we can protect the children easily. By preventing criminals before happening, it is going to be a helpful system for our safe life.

The Trend Analysis of Propulsion System for Railway Vehicle Using Patent Analysis (특허분석을 통한 철도차량용 추진제어장치 기술 분석)

  • Han, Young-Jae;Lee, Su-Gil;Park, Chan-Kyoung;Kim, Young-Guk;Bae, Chang-Han
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.19 no.5
    • /
    • pp.131-138
    • /
    • 2018
  • In this study, we investigated the trend of technological development in major countries related to the propulsion equipment of railway vehicles. The propulsion system is the main equipment of electric vehicles. A lot of time and investment are required in order to ensure the development of technology. Therefore, developed countries have maximized their effort to develop technologies with safety, reliability, and convenience of maintenance. They have also done their utmost to prevent technology transfer to other countries after the development of new technologies. For example, Toshiba of Japan developed a new 3,300V/1,500 A class IGBT power device, but was reluctant to export it to foreign countries in order to protect this technology. In this study, we analyzed the patents applied for related to propulsion control systems and presented the direction of development during the technical development of these systems. The patent analysis of the core technologies was conducted using the Thomson Innovation DB. We examined the number of patents applied for by country, year and major applicant. As a result of the analysis, it was found that the proportion of patent applications per country was in the order of China, 48%, Europe 16.6%, and the United States 14.9%. The patent situation of the top 10 principal applicants revealed that (the top three were?) ABB 14%, GE 13%, and CRRC 12%. At the same time, we also conducted a qualitative analysis of the level of technical development by evaluating such factors as the influence index, quotation, market securing power and citation. Based on the result of the patent analysis, we presented the direction of technical development of the propulsion control equipment of railway vehicles. Based on the analysis results, it was found that domestic applicants considerably reduced their efforts to protect their patents from foreign companies. Nowadays, most of the electric motors used in Korea are induction motors. In advanced countries, permanent magnet electric motors are employed in new railway lines. Therefore, intensive investment is needed in new developments.