• 제목/요약/키워드: Sense of security

검색결과 260건 처리시간 0.026초

LTE 네트워크에서의 IoT 장치를 위한 향상된 보안 거래 (Enhanced Secure Transaction Protocol for IoT Devices via LTE Network)

  • AL-Alkeem, Ebrahim;Yeun, Chan Yeob;Hammadi, Yousef Al;Yeun, Hyun Ku;Byon, Young-Ji
    • 전기학회논문지
    • /
    • 제66권12호
    • /
    • pp.1921-1936
    • /
    • 2017
  • Internet of Thing (IoT) and NFC (Near Field Communication) have got a good adaptable structure that it can be easily combined with any wireless network. Since IoT/NFC can be used to communicate wirelessly with all the transactions that can be done remotely without any physical connections. In this paper, we propose an enhanced secure IoT/NFC protocol based on LTE network that enhances the original security level provided by the LTE. Our approach is new in a sense that it covers LTE in contrast to old networks like GSM and 3G, which substantially treated in the literature. Moreover, both GSM and 3G have several drawbacks when they are combined with the NFC technology, which has potential weakness in confidentiality, integrity, and authentication. Hence our new approach will resolve the security of the new LTE system. We expect that our protocol will result in new secure applications for the smart phone markets.

토석류 피해지역 토사유출량 산정 방법의 적정성 분석 (Analysis of Appropriateness of Estimation Methods for Sediment Yields in Damaged Areas by Debris Flow)

  • 김기중;전계원;강배동
    • 한국방재안전학회논문집
    • /
    • 제15권1호
    • /
    • pp.35-46
    • /
    • 2022
  • 본 연구에서는 토석류 피해 발생지역에 대해 토사유출량 산정에 많이 사용되고 있는 RUSLE와 NILIM 그리고 Marchi의 경험식을 통해 토사유출량을 산정하였으며, 토사유출량 산정 방법의 국내 적용성을 검토하기 위해 정밀측량 및 현장조사를 통해 측정된 토사유출량을 비교하였다. RUSLE 방법은 실측 토사유출량에 비해 평균 2.13배 과다 산정되었으며, Marchi의 경험식은 평균 2.83배, NILIM 경험식의 경우 평균 1.26배로 세 가지 경험식 중 가장 낮은 오차가 발생하였다.

An IoT-Aware System for Managing Patients' Waiting Time Using Bluetooth Low-Energy Technology

  • Reham Alabduljabbar
    • International Journal of Computer Science & Network Security
    • /
    • 제24권3호
    • /
    • pp.83-92
    • /
    • 2024
  • It is a common observation that whenever any patient arrives at the front desk of a hospital, outpatient clinic, or other health-associated centers, they have to first queue up in a line and wait to fill in their registration form to get admitted. The long waiting time without any status updates is the most common complaint, worrying health officials. In this paper, UrNext, a location-aware mobile-based solution using Bluetooth low-energy (BLE) technology, is presented to solve the problem. Recently, a technology-oriented method has been gaining popularity in solving the healthcare sector's problems, namely the Internet of Things (IoT). The implementation of this solution could be explained through a simple example that when a patient arrives at a clinic for her consultation. There, instead of having to wait in long lines, she will be greeted automatically, receive a push notification telling her that she has been admitted along with an estimated waiting time for her consultation session. This will not only provide the patients with a sense of freedom but would also reduce uncertainty levels that are generally observed, thus saving both time and money. This work aimed to improve clinics' quality of services and organize queues and minimize waiting times in clinics, leading to patient comfortability and reducing the burden on nurses and receptionists. The results demonstrated that the presented system was successful in its performance and helped achieve high usability.

Probabilistic Analysis of Code-Reuse Attacks and Defenses in IoT

  • Ho, Jun-Won
    • International Journal of Internet, Broadcasting and Communication
    • /
    • 제9권1호
    • /
    • pp.24-28
    • /
    • 2017
  • In the Internet of Things (IoT), resource-limited smart devices communicate with each other while performing sensing and computation tasks. Thus, these devices can be exposed to various attacks being launched and spread through network. For instance, attacker can reuse the codes of IoT devices for malicious activity executions. In the sense that attacker can craft malicious codes by skillfully reusing codes stored in IoT devices, code-reuse attacks are generally considered to be dangerous. Although a variety of schemes have been proposed to defend against code-reuse attacks, code randomization is regarded as a representative defense technique against code-reuse attacks. Indeed, many research have been done on code randomization technique, however, there are little work on analysis of the interactions between code randomization defenses and code-reuse attacks although it is imperative problem to be explored. To provide the better understanding of these interactions in IoT, we analyze how code randomization defends against code-reuse attacks in IoT and perform simulation on it. Both analysis and simulation results show that the more frequently code randomizations occur, the less frequently code-reuse attacks succeed.

GT-PSO- An Approach For Energy Efficient Routing in WSN

  • Priyanka, R;Reddy, K. Satyanarayan
    • International Journal of Computer Science & Network Security
    • /
    • 제22권4호
    • /
    • pp.17-26
    • /
    • 2022
  • Sensor Nodes play a major role to monitor and sense the variations in physical space in various real-time application scenarios. These nodes are powered by limited battery resources and replacing those resource is highly tedious task along with this it increases implementation cost. Thus, maintaining a good network lifespan is amongst the utmost important challenge in this field of WSN. Currently, energy efficient routing techniques are considered as promising solution to prolong the network lifespan where multi-hop communications are performed by identifying the most energy efficient path. However, the existing scheme suffer from performance related issues. To solve the issues of existing techniques, a novel hybrid technique by merging particle swarm optimization and game theory model is presented. The PSO helps to obtain the efficient number of cluster and Cluster Head selection whereas game theory aids in finding the best optimized path from source to destination by utilizing a path selection probability approach. This probability is obtained by using conditional probability to compute payoff for agents. When compared to current strategies, the experimental study demonstrates that the proposed GTPSO strategy outperforms them.

Nuclear power utilization as a future alternative energy on icebreakers

  • M. Bayraktar;M. Pamik
    • Nuclear Engineering and Technology
    • /
    • 제55권2호
    • /
    • pp.580-586
    • /
    • 2023
  • Diversified fuel types such as methanol, hydrogen, liquefied natural gas, ammonia, biofuels, have been come to fore in consideration of the limitations, regulations, environmental perception and efficient use of resources on maritime sector. NE is described as a substantial alternative energy source on the marine vessels in the sense of de-carbonization and fuel efficiency activities carried out by IMO. Although NPVs have been constructed for the merchant, navy and supply fields over the years, their numbers are few and working ranges are quite limited. NE generation techniques, reactor types, safety and security issues in case of any leakage or radiation pollution are analyzed and comparisons are performed between fossil-based fueled and NP based on icebreakers. The comparison are conducted on the basis of dimensions, resistances and operational competences by the VIKOR. NP icebreakers operated in recent years occupy a notable position in the ranking, although fossil fueled ones are most prevalent. Consequently, refueling period and emissions are the principal benefits of NPVs. Nevertheless, the use of such systems on marine vessels especially for merchant ships may come to the fore when all concerns in terms of safety, security and society are resolved since the slightest mistake can have irreversible consequences.

트라이톤 패러독스를 이용한 생체인증의 고찰 (Study of Biometrics using Tritone Paradox)

  • 정창훈;신동오;양대헌;이경희
    • 정보보호학회논문지
    • /
    • 제25권5호
    • /
    • pp.1085-1095
    • /
    • 2015
  • 음악 이론에서 트라이톤은 세 개의 온음(또는 여섯 개의 반음) 차이를 가지도록 구성된 음정을 말하며, 조화와 선율의 불협화음을 발생시킨다. 트라이톤 패러독스는 일종의 청각적 착각으로, 트라이톤을 들은 어떤 사람은 이것이 올라가는 연음으로 들리지만, 또 어떤 사람은 이를 내려가는 연음으로 들리는 현상을 말한다. 이 논문은 트라이톤 패러독스를 이용한 새로운 비정적 생체인증기법에 대해 검토하고, 사용자 실험을 통하여 이 기법의 유일성과 일관성을 분석한다. 그리고 이를 응용하여 키로깅, 어깨너머 훔쳐보기, 무작위 대입 등의 공격에 대해 안전한 몇 가지 인증 프로토콜을 제안한다.

Secure Encryption Schemes의 구축에 따른 One-Way 함수의 연구 (Study on One-Way Functions for the Construction of Secure Encryption Schemes)

  • 유승재
    • 융합보안논문지
    • /
    • 제3권3호
    • /
    • pp.75-80
    • /
    • 2003
  • one-way 함수는 패스워드와 같이 compute는 쉽고 invert는 어렵다는 의미를 갖는 함수로서 암호기법에서 매우 중요한 역할을 하고 있으며, 특히 encryption schemes 의 존재성은 바로 one-way 함수의 존재성을 필요로 하고 있음은 잘 알려진 사실이다. 본 연구에서는 기존 암호기 법에 존재하는 one-way 함수들을 분석하고 또한 one-way 함수가 될 수 있는 여러 가지 형태의 함수들을 조사 연구함으로써 다양하고 안전한 encryption schemes을 갖추기 위한 근원을 제공한다. one-way 함수의 종류, 역할과 그 특성을 살펴보고 one-way 함수의 일반적인 조건을 통하여 one-way 함수가 될 수 있는 여러 가지 함수들을 조사하고, one-way 함수와 trapdoor 함수에 대한 이론적 특성을 논하였다.

  • PDF

미래형 예비군 훈련체제 정립에 관한 연구 (Thinking about the training system of R.O.K. reserved force in the future)

  • 정원영
    • 안보군사학연구
    • /
    • 통권5호
    • /
    • pp.47-85
    • /
    • 2007
  • Reserved force's training(RFT) is undoubtedly the critical component to increase the national capability in case of emergency. It is because RFT plays an important role in maintaining the peace for the Korean peninsula as the key deterrence force power for more than 40 years. Considering the reserved force reform linked with the goal and the plan of Korean Defense Reform 2020', we can expect the utility of the reserved force as the potential combat power to make national defense resources more efficient and useful. In that sense, this study suggests some solutions to promote the reserved force's competency to demonstrate the ROK Armed Force's combat power as the equivalent partner with the active force as well as the future deterrence power. This study also analyzes the present training system including law and regulation, identifies some implications through the literature review, and designs the future ROK reserved force's training system by extracting new variables forecasting the future environment for national defense. In addition, this study includes its concerned systems generally without limiting the scope into the reserved force. Therefore we try to seek to prepare for mobilization readiness and to promote regional hometown defense capability in order to cope with the enemy's threat in case of emergency.

  • PDF

RFID와 무선 센서네트워크를 융합한 프로토콜에서의 보안 문제 (Security Issues in Combined Protocol Between RFID Application and Wireless Sensor Network)

  • 김정태
    • 한국정보통신학회:학술대회논문집
    • /
    • 한국정보통신학회 2013년도 추계학술대회
    • /
    • pp.154-155
    • /
    • 2013
  • 본 논문에서는 무선 센서네트워크망을 이용한 헬스케어 시스템에서의 사용자 인증을 위한 프레임에서의 보안 문제를 해석하였다. 이러한 메디컬 센서 데이타는 환자의 몸으로 부터 신호를 받아 의사 등과 스태프에게 정보를 전달한다. 개개인의 정보가 취약성을 가지고 있으며, 비 인가된 제 3자에게 노출되고 있다. 따라서, 본 논문에서는 두 가지의 요소를 가진 사용자 인증 프로토콜을 설계할 때 문제시 되는 방법을 분석하였다. 또한 이러한 프로토콜에서 발생 가능한 위협 요소를 정의하였다.

  • PDF