• Title/Summary/Keyword: Sense of security

Search Result 260, Processing Time 0.028 seconds

Enhanced Secure Transaction Protocol for IoT Devices via LTE Network (LTE 네트워크에서의 IoT 장치를 위한 향상된 보안 거래)

  • AL-Alkeem, Ebrahim;Yeun, Chan Yeob;Hammadi, Yousef Al;Yeun, Hyun Ku;Byon, Young-Ji
    • The Transactions of The Korean Institute of Electrical Engineers
    • /
    • v.66 no.12
    • /
    • pp.1921-1936
    • /
    • 2017
  • Internet of Thing (IoT) and NFC (Near Field Communication) have got a good adaptable structure that it can be easily combined with any wireless network. Since IoT/NFC can be used to communicate wirelessly with all the transactions that can be done remotely without any physical connections. In this paper, we propose an enhanced secure IoT/NFC protocol based on LTE network that enhances the original security level provided by the LTE. Our approach is new in a sense that it covers LTE in contrast to old networks like GSM and 3G, which substantially treated in the literature. Moreover, both GSM and 3G have several drawbacks when they are combined with the NFC technology, which has potential weakness in confidentiality, integrity, and authentication. Hence our new approach will resolve the security of the new LTE system. We expect that our protocol will result in new secure applications for the smart phone markets.

Analysis of Appropriateness of Estimation Methods for Sediment Yields in Damaged Areas by Debris Flow (토석류 피해지역 토사유출량 산정 방법의 적정성 분석)

  • Kim, Gi Jung;Jun, Kye Won;Kang, Bae Dong
    • Journal of Korean Society of Disaster and Security
    • /
    • v.15 no.1
    • /
    • pp.35-46
    • /
    • 2022
  • In this study, the amount of debris flow was calculated through the empirical equations of RUSLE, NILIM, and Marchi, which are widely used to calculate areas affected by debris flow, and debris flow measured through precise measurements and field surveys was compared. The RUSLE method over estimated by 2.13 times in the average sense compared with the measured sediment quantify and Marchi's empirical equation over estimated by 2.83 times while NILIM's empirical equation 1.26 times, which is the lowest error among the three empirical equation.

An IoT-Aware System for Managing Patients' Waiting Time Using Bluetooth Low-Energy Technology

  • Reham Alabduljabbar
    • International Journal of Computer Science & Network Security
    • /
    • v.24 no.3
    • /
    • pp.83-92
    • /
    • 2024
  • It is a common observation that whenever any patient arrives at the front desk of a hospital, outpatient clinic, or other health-associated centers, they have to first queue up in a line and wait to fill in their registration form to get admitted. The long waiting time without any status updates is the most common complaint, worrying health officials. In this paper, UrNext, a location-aware mobile-based solution using Bluetooth low-energy (BLE) technology, is presented to solve the problem. Recently, a technology-oriented method has been gaining popularity in solving the healthcare sector's problems, namely the Internet of Things (IoT). The implementation of this solution could be explained through a simple example that when a patient arrives at a clinic for her consultation. There, instead of having to wait in long lines, she will be greeted automatically, receive a push notification telling her that she has been admitted along with an estimated waiting time for her consultation session. This will not only provide the patients with a sense of freedom but would also reduce uncertainty levels that are generally observed, thus saving both time and money. This work aimed to improve clinics' quality of services and organize queues and minimize waiting times in clinics, leading to patient comfortability and reducing the burden on nurses and receptionists. The results demonstrated that the presented system was successful in its performance and helped achieve high usability.

Probabilistic Analysis of Code-Reuse Attacks and Defenses in IoT

  • Ho, Jun-Won
    • International Journal of Internet, Broadcasting and Communication
    • /
    • v.9 no.1
    • /
    • pp.24-28
    • /
    • 2017
  • In the Internet of Things (IoT), resource-limited smart devices communicate with each other while performing sensing and computation tasks. Thus, these devices can be exposed to various attacks being launched and spread through network. For instance, attacker can reuse the codes of IoT devices for malicious activity executions. In the sense that attacker can craft malicious codes by skillfully reusing codes stored in IoT devices, code-reuse attacks are generally considered to be dangerous. Although a variety of schemes have been proposed to defend against code-reuse attacks, code randomization is regarded as a representative defense technique against code-reuse attacks. Indeed, many research have been done on code randomization technique, however, there are little work on analysis of the interactions between code randomization defenses and code-reuse attacks although it is imperative problem to be explored. To provide the better understanding of these interactions in IoT, we analyze how code randomization defends against code-reuse attacks in IoT and perform simulation on it. Both analysis and simulation results show that the more frequently code randomizations occur, the less frequently code-reuse attacks succeed.

GT-PSO- An Approach For Energy Efficient Routing in WSN

  • Priyanka, R;Reddy, K. Satyanarayan
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.4
    • /
    • pp.17-26
    • /
    • 2022
  • Sensor Nodes play a major role to monitor and sense the variations in physical space in various real-time application scenarios. These nodes are powered by limited battery resources and replacing those resource is highly tedious task along with this it increases implementation cost. Thus, maintaining a good network lifespan is amongst the utmost important challenge in this field of WSN. Currently, energy efficient routing techniques are considered as promising solution to prolong the network lifespan where multi-hop communications are performed by identifying the most energy efficient path. However, the existing scheme suffer from performance related issues. To solve the issues of existing techniques, a novel hybrid technique by merging particle swarm optimization and game theory model is presented. The PSO helps to obtain the efficient number of cluster and Cluster Head selection whereas game theory aids in finding the best optimized path from source to destination by utilizing a path selection probability approach. This probability is obtained by using conditional probability to compute payoff for agents. When compared to current strategies, the experimental study demonstrates that the proposed GTPSO strategy outperforms them.

Nuclear power utilization as a future alternative energy on icebreakers

  • M. Bayraktar;M. Pamik
    • Nuclear Engineering and Technology
    • /
    • v.55 no.2
    • /
    • pp.580-586
    • /
    • 2023
  • Diversified fuel types such as methanol, hydrogen, liquefied natural gas, ammonia, biofuels, have been come to fore in consideration of the limitations, regulations, environmental perception and efficient use of resources on maritime sector. NE is described as a substantial alternative energy source on the marine vessels in the sense of de-carbonization and fuel efficiency activities carried out by IMO. Although NPVs have been constructed for the merchant, navy and supply fields over the years, their numbers are few and working ranges are quite limited. NE generation techniques, reactor types, safety and security issues in case of any leakage or radiation pollution are analyzed and comparisons are performed between fossil-based fueled and NP based on icebreakers. The comparison are conducted on the basis of dimensions, resistances and operational competences by the VIKOR. NP icebreakers operated in recent years occupy a notable position in the ranking, although fossil fueled ones are most prevalent. Consequently, refueling period and emissions are the principal benefits of NPVs. Nevertheless, the use of such systems on marine vessels especially for merchant ships may come to the fore when all concerns in terms of safety, security and society are resolved since the slightest mistake can have irreversible consequences.

Study of Biometrics using Tritone Paradox (트라이톤 패러독스를 이용한 생체인증의 고찰)

  • Jung, Changhoon;Shin, DongOh;Nyang, DaeHun;Lee, KyungHee
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.25 no.5
    • /
    • pp.1085-1095
    • /
    • 2015
  • In music theory, the triton is defined as a musical interval composed of three adjacent whole tones(or six semitones), which generates a harmonic and melodic dissonance. The triton paradox is an auditory illusion which is heard as ascending by some people and as descending by others. In this paper we examine an emerging non-static biometric technique that aims to identify users based on analyzing uniqueness and consistency through the user experiences. We also propose some authentication schemes which provides protection against key logging, shoulder surfing, and brute force attacks.

Study on One-Way Functions for the Construction of Secure Encryption Schemes (Secure Encryption Schemes의 구축에 따른 One-Way 함수의 연구)

  • Yoo, Seung-Jae
    • Convergence Security Journal
    • /
    • v.3 no.3
    • /
    • pp.75-80
    • /
    • 2003
  • One way Functions are similar to the passwords in the sense that are easy to compute and hard to invert. So they are the most basic primitive for cryptographic applications. Especially, it is well known that it needs to exist of one way functions for the existence of the encryption schemes. In this note, we devote to study the various properties of the one way functions to give the base for the construction of the secure encryption schemes. They include the study for a sort and part of one way functions. Also, we deal with the theoretical relationship between one way function and trapdoor function.

  • PDF

Thinking about the training system of R.O.K. reserved force in the future (미래형 예비군 훈련체제 정립에 관한 연구)

  • Jeong, Won-Young
    • Journal of National Security and Military Science
    • /
    • s.5
    • /
    • pp.47-85
    • /
    • 2007
  • Reserved force's training(RFT) is undoubtedly the critical component to increase the national capability in case of emergency. It is because RFT plays an important role in maintaining the peace for the Korean peninsula as the key deterrence force power for more than 40 years. Considering the reserved force reform linked with the goal and the plan of Korean Defense Reform 2020', we can expect the utility of the reserved force as the potential combat power to make national defense resources more efficient and useful. In that sense, this study suggests some solutions to promote the reserved force's competency to demonstrate the ROK Armed Force's combat power as the equivalent partner with the active force as well as the future deterrence power. This study also analyzes the present training system including law and regulation, identifies some implications through the literature review, and designs the future ROK reserved force's training system by extracting new variables forecasting the future environment for national defense. In addition, this study includes its concerned systems generally without limiting the scope into the reserved force. Therefore we try to seek to prepare for mobilization readiness and to promote regional hometown defense capability in order to cope with the enemy's threat in case of emergency.

  • PDF

Security Issues in Combined Protocol Between RFID Application and Wireless Sensor Network (RFID와 무선 센서네트워크를 융합한 프로토콜에서의 보안 문제)

  • Kim, Jung Tae
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2013.10a
    • /
    • pp.154-155
    • /
    • 2013
  • This paper presents a user authentication scheme for healthcare application using wireless sensor networks, where wireless sensors are used for patients monitoring. These medical sensors' sense the patient body data and transmit it to the professionals. Since, the data of an individual are highly vulnerable; it must ensures that patients medical vital signs are secure, and are not exposed to an unauthorized person. In this regards, we propose a user authentication scheme for healthcare application using medical sensor networks. The proposed scheme includes: a novel two-factor user authentication, where the healthcare professionals are authenticated before access the patient's body data; a secure session key is establish between the patient sensor node and the professional at the end of user authentication. Furthermore, the analysis shows that the proposed scheme is safeguard to various practical attacks and achieves efficiency at low computation cost.

  • PDF