• Title/Summary/Keyword: Security technologies

Search Result 1,846, Processing Time 0.033 seconds

Serviceability Evaluation of ZigBee Technology for Construction Applications (설문조사를 통한 ZigBee 무선통신기술의 건설산업 사용성평가에 관한 연구)

  • Shin, Young Shik;Cao, Shang;Jang, Won-Suk
    • KSCE Journal of Civil and Environmental Engineering Research
    • /
    • v.32 no.3D
    • /
    • pp.247-258
    • /
    • 2012
  • This research evaluates the serviceability of ZigBee device that provides a potential technology to realizing the ubiquitous computing by improving the productivity and effectiveness in construction and data acquisition. Literature review was conducted in various application areas such as bridge monitoring, slope management, road management, highway traffic control. In addition characteristics and challenges in various wireless technologies are described to identify their adoptability to construction environment. Among them, ZigBee technology was selected to introduce the functionality on hardware, network, and security. Then, questionnaire survey was implemented by four different group, construction engineers, students, hardware developers, and researchers to explore the success and failure factors of ZigBee technology in construction area. The results proposes a guideline of the applicability of ZigBee technology in the area of serviceability, application area, considerations, and future direction. This paper would provide valuable information for future researches and technology development in designing the wireless sensor network applications.

Passwordless Protection for Private Key Using USIM Information (USIM 정보를 활용한 패스워드리스 방식의 개인키 보호 방안)

  • Kim, Seon-Joo
    • The Journal of the Korea Contents Association
    • /
    • v.17 no.6
    • /
    • pp.32-38
    • /
    • 2017
  • Despite the opinion that certificate is useless, half of the population in Korea (approx. 35 million) get an certificate, and use it for internet banking, internet shopping, stock trading, and so on. Most users store their certificates on a usb memory or smartphone, and certificates or passwords stored on such storage media can be easily attacked and used to disguise as legitimate users. Due to these security problem of certificate, a various authentication technologies has been proposed such as smartphone owner authentication using SMS, and a personal authentication using biometric authentication. However, a safe technique is not presented yet without user password, and certificate. In this paper, I proposed a method to secure certificate/private key without a user password using a combination of USIM card and smartphone's information. Even if a hacker gets the user password, the certificate, and the private key, he can not use the certificate. User do not need to remember complex password which is a combination of alphabetic / numeric / special characters, and use his certificate safely.

Smart Plant Disease Management Using Agrometeorological Big Data (농업기상 빅데이터를 활용한 스마트 식물병 관리)

  • Kim, Kwang-Hyung;Lee, Junhyuk
    • Research in Plant Disease
    • /
    • v.26 no.3
    • /
    • pp.121-133
    • /
    • 2020
  • Climate change, increased extreme weather and climate events, and rapidly changing socio-economic environment threaten agriculture and thus food security of our society. Therefore, it is urgent to shift from conventional farming to smart agriculture using big data and artificial intelligence to secure sustainable growth. In order to efficiently manage plant diseases through smart agriculture, agricultural big data that can be utilized with various advanced technologies must be secured first. In this review, we will first learn about agrometeorological big data consisted of meteorological, environmental, and agricultural data that the plant pathology communities can contribute for smart plant disease management. We will then present each sequential components of the smart plant disease management, which are prediction, monitoring and diagnosis, control, prevention and risk management of plant diseases. This review will give us an appraisal of where we are at the moment, what has been prepared so far, what is lacking, and how to move forward for the preparation of smart plant disease management.

A Priority Evaluation Methodology for Spin-off of Defense Technology : Patent Analysis and AHP Approach (국방 기술의 민수화 우선순위 평가 방법론 : 특허 분석 및 계층분석과정 (AHP) 기반)

  • Park, Yun-Mi;Seol, Hyeon-Ju
    • Journal of the military operations research society of Korea
    • /
    • v.36 no.3
    • /
    • pp.15-27
    • /
    • 2010
  • Dual-use technology, upon its effective development, can be a highly efficient technology that may be utilized for both achieving industry competitiveness and building National Security. Although research needs for such development methodology and call for corresponding efforts have long been proposed, actual outputs have not reached its desired level. Hence, this paper aims to provide more concrete and quantitative process in technology planning used to activate development of dual-use technology, considering dual usability and transferability of such technologies. In such effort, we propose use of patent analysis and the Analytic Hierarchy Process (AHP) for determining priorities for spin-off defense technology. First, the necessity of R&D and potential spin-off are measured based on patent information. Second, the necessity of R&D results from a quantitative analysis and the potentials spin-off are derived from analysis of patent citations. Then, AHP is used to calculate the importance of evaluating factors, and to assess alternative scores. Finally, we present the result of spin-off priority. A case study on the Korea defense technology is presented to illustrate the proposed method. We expect this study to make contribution in vision making of the military R&D spending.

Re-anonymization Technique for Dynamic Data Using Decision Tree Based Machine Learning (결정트리 기반의 기계학습을 이용한 동적 데이터에 대한 재익명화기법)

  • Kim, Young Ki;Hong, Choong Seon
    • Journal of KIISE
    • /
    • v.44 no.1
    • /
    • pp.21-26
    • /
    • 2017
  • In recent years, new technologies such as Internet of Things, Cloud Computing and Big Data are being widely used. And the type and amount of data is dramatically increasing. This makes security an important issue. In terms of leakage of sensitive personal information. In order to protect confidential information, a method called anonymization is used to remove personal identification elements or to substitute the data to some symbols before distributing and sharing the data. However, the existing method performs anonymization by generalizing the level of quasi-identifier hierarchical. It requires a higher level of generalization in case where k-anonymity is not satisfied since records in data table are either added or removed. Loss of information is inevitable from the process, which is one of the factors hindering the utility of data. In this paper, we propose a novel anonymization technique using decision tree based machine learning to improve the utility of data by minimizing the loss of information.

Ship Safety Management System based on IoT(Internet of Things) (IoT(Internet of Things)시대의 선박 안전관리시스템 구축 연구)

  • Lim, Sung-Hun;Ko, Young-Kyu;Park, Jin-Soo
    • Proceedings of the Korean Institute of Navigation and Port Research Conference
    • /
    • 2014.06a
    • /
    • pp.144-145
    • /
    • 2014
  • IoT (Internet of Things) is connected to all things Internet-based people and things, things and objects that communicate information between said intelligent technologies and services. Shipping each of a variety of devices that act independently from each other, but, it is actively interlock with each other is not easy practically days. Ship it within the means of communication, the communication between the ship, the communication between ship and shore configuration, SAN (Ship Area Network), RFID/USN, broadband communications, satellite communications and IT technology to a variety of marine environments for the safe navigation the ship's safety management system for the configuration you want to discuss the plan.

  • PDF

Proxy Signature, ID-based Partially Blind Signature and Proxy Partially Blind Signature using Bilinear-pairing (Bilinear-pairing을 이용한 대리서명, ID 기반 부분은닉서명과 대리부분은닉서명 방식)

  • Kim Hyuniue;Yeo Sanghee;Won Dongho
    • Journal of KIISE:Information Networking
    • /
    • v.31 no.6
    • /
    • pp.545-555
    • /
    • 2004
  • Proxy signature scheme allow a designated proxy person to sign a message on behalf of the original signer. Partially blind signature scheme allows the signer to insert non-removable common information into his blind signature. Proxy signature and partially blind signature are very important technologies in secure e-commerce. In this paper we propose new proxy signature scheme and ID-based partially blind signature scheme using bilinear pairing. further combining them, we propose a proxy partially blind signature scheme. The security of our schemes relies on the hardness of Computational Diffie-Hellman Problem. If we removing common information form propose ID-based partially blind signature scheme and proxy partially blind signature scheme, then they become variants of ID-based blind signature scheme and proxy blind signature scheme of Zhangs respectively.

Fast Search with Data-Oriented Multi-Index Hashing for Multimedia Data

  • Ma, Yanping;Zou, Hailin;Xie, Hongtao;Su, Qingtang
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.9 no.7
    • /
    • pp.2599-2613
    • /
    • 2015
  • Multi-index hashing (MIH) is the state-of-the-art method for indexing binary codes, as it di-vides long codes into substrings and builds multiple hash tables. However, MIH is based on the dataset codes uniform distribution assumption, and will lose efficiency in dealing with non-uniformly distributed codes. Besides, there are lots of results sharing the same Hamming distance to a query, which makes the distance measure ambiguous. In this paper, we propose a data-oriented multi-index hashing method (DOMIH). We first compute the covariance ma-trix of bits and learn adaptive projection vector for each binary substring. Instead of using substrings as direct indices into hash tables, we project them with corresponding projection vectors to generate new indices. With adaptive projection, the indices in each hash table are near uniformly distributed. Then with covariance matrix, we propose a ranking method for the binary codes. By assigning different bit-level weights to different bits, the returned bina-ry codes are ranked at a finer-grained binary code level. Experiments conducted on reference large scale datasets show that compared to MIH the time performance of DOMIH can be improved by 36.9%-87.4%, and the search accuracy can be improved by 22.2%. To pinpoint the potential of DOMIH, we further use near-duplicate image retrieval as examples to show the applications and the good performance of our method.

App-based 2-channel User Authentication Scheme for Multiple Application Systems (다중 응용시스템용 앱기반 2-채널 사용자 인증방안)

  • Song, Tae-Gi;Jo, In-June
    • The Journal of the Korea Contents Association
    • /
    • v.18 no.9
    • /
    • pp.141-148
    • /
    • 2018
  • Currently, the user authentication technology used by users to access multiple applications within an organization is being applied with ID/PW-based SSO technology. These user authentication methods have the fundamental disadvantages of ID/PW and SSO. This means that security vulnerabilities in ID/PW can lead to periodic changes in PWs and limits on the number of incorrect PW inputs, and SSO adds high cost of the SSO server, which centrally stores the authentication information, etc. There is also a fundamental vulnerability that allows others to freely use other people's applications when they leave the portal application screen with SSO. In this paper, we proposed an app-based 2-channel authentication scheme to fundamentally eliminate problems with existing ID/PW-based SSO user authentication technologies. To this end, it distributed centralized user authentication information that is stored on SSO server to each individual's smartphone. In addition, when users access a particular application, they are required to be authenticated through their own smartphone apps.

Path Prediction and Suggestion of Efficient Collection Points for Marine Plastic Debris Based on Betweenness Centrality Analysis (매개 중심성을 이용한 해양 플라스틱 폐기물의 경로 예측 및 효율적인 수거지점 제안)

  • Jeon, Yeon Seon;Hong, Min Ji;Park, Moo Kyu;Choi, Yong-Sang
    • Journal of Korean Society of Environmental Engineers
    • /
    • v.37 no.7
    • /
    • pp.426-431
    • /
    • 2015
  • Korea severely suffers from plastic-induced ocean pollution, but only few studies predicted the trajectory of marine plastic debris and provided their collection method. This study used Ocean Surface CURrent Simulator (OSCURS) of National Oceanic and Atmospheric Administration (NOAA) in order to predict the trajectories of marine plastic debris flowing into the East Sea and Yellow Sea for each season during 2004 to 2013. Results suggest that efficient collection hubs through the high betweenness centrality index. Most hubs were located in the seashores regardless of season, suggesting the seashore of Uljin for the East Sea and the seashore between Saemangeum and Shinan for the Yellow Sea as the most efficient hubs.