• Title/Summary/Keyword: Smart Home Security

Search Result 177, Processing Time 0.023 seconds

Implementation of Smart Home Agent using Object Modeling (객체 모델링을 이용한 스마트 홈 에이전트의 구현)

  • Park, Myoung-Soo;Kim, Jong-Ki;Her, Woong;Park, Young-Bae;Min, Hong-Ki
    • Proceedings of the Korea Institute of Convergence Signal Processing
    • /
    • 2005.11a
    • /
    • pp.294-297
    • /
    • 2005
  • 가전 기술이 발달하면서 유비쿼터스 홈 시스템인 스마트 홈에 관한 연구가 활발히 진행되고 있다. 스마트 홈 환경에서는 매우 다양한 서비스가 존재한다. 이러한 서비스를 정보화 하여 관리하는 것은 스마트 홈의 실현을 앞당기기 위한 중요한 방법이라 할 수 있다. 본 논문에서는 서비스의 특징을 추출하고 정보 가전을 제어할 수 있는 에이전트를 구현하였다. 스마트 홈에서 존재하는 다양한 서비스를 객체지향 방법을 이용하여 구현된 에이전트로 모델링한다. 스마트 홈 서비스를 정형화 하고, 객체 기반 모델링 방법으로 구현함으로써 서비스 정보를 관리하고 응용해야 하는 연구 분야에 적용이 가능하여 유비쿼터스 가정환경인 스마트 홈의 실현을 앞당기는데 기여할 수 있을 것으로 기대된다.

  • PDF

Speed Optimized Implementation of HUMMINGBIRD Cryptography for Sensor Network

  • Seo, Hwa-Jeong;Kim, Ho-Won
    • Journal of information and communication convergence engineering
    • /
    • v.9 no.6
    • /
    • pp.683-688
    • /
    • 2011
  • The wireless sensor network (WSN) is well known for an enabling technology for the ubiquitous environment such as real-time surveillance system, habitat monitoring, home automation and healthcare applications. However, the WSN featuring wireless communication through air, a resource constraints device and irregular network topology, is threatened by malicious nodes such as eavesdropping, forgery, illegal modification or denial of services. For this reason, security in the WSN is key factor for utilizing the sensor network into the commercial way. There is a series of symmetric cryptography proposed by laboratory or industry for a long time. Among of them, recently proposed HUMMINGBIRD algorithm, motivated by the design of the well-known Enigma machine, is much more suitable to resource constrained devices, including smart card, sensor node and RFID tags in terms of computational complexity and block size. It also provides resistance to the most common attacks such as linear and differential cryptanalysis. In this paper, we implements ultra-lightweight cryptography, HUMMINGBIRD algorithm into the resource constrained device, sensor node as a perfectly customized design of sensor node.

Home Environment Check System using Android phone (안드로이드 폰을 이용한 집 안 환경 체크 시스템)

  • Lee, Jae-Gil;Koo, Bon-Woo
    • Proceedings of the Korean Society of Computer Information Conference
    • /
    • 2013.07a
    • /
    • pp.419-420
    • /
    • 2013
  • 논문에서는 가스 밸브 잠금 확인, 외출 시 타인이 현관문을 열었을 경우의 여부, 귀중품 상자를 열었는지의 여부 등 집안의 상태 변화를 네트워크를 통하여 전송하여 스마트폰으로 확인할 수 있게 하고, 스마트 폰으로 집안의 특정 장치를 제어할 수 있는 집안 환경 체크 및 제어 시스템을 설계하고 구현하였다. 이 장치를 활용하여 스마트 폰으로 언제 어디서나 도둑의 침입을 알 수 있으며, 필요시 집안의 장치들을 원격에서 조절할 수 있다.

  • PDF

The trend of Smart home security technology and policy (스마트홈 보안 기술 및 정책 동향)

  • Cho, Geumhwan;Kang, Jina;Cho, Jun Sung;Song, Youngbae;Kim, Hyoungshick
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2015.04a
    • /
    • pp.445-448
    • /
    • 2015
  • 가정의 모든 전기적인 기기들이 사용자에 의해 원격제어 될 수 있는 환경을 스마트홈이라 한다. 본 논문에서는 스마트홈 환경에서 발생할 수 있는 보안위협에 대해 알아보고, 스마트홈 보안위협을 해결하기 위한 국내 외 보안 R&D 및 솔루션 개발, 표준화 및 정책 동향에 대해 알아보고자 한다.

Adoption of the Use of Smart Technology by Health-care Workers in Nursing Homes: an Exploratory Study (노인요양시설의 스마트 기술 도입에 대한 탐색적 연구 -요양시설 종사자 답변을 중심으로-)

  • Lee, Sunhyung;Ahn, Joonhee
    • The Journal of the Korea Contents Association
    • /
    • v.14 no.8
    • /
    • pp.156-171
    • /
    • 2014
  • The purpose of this exploratory study is to examine if the application of smart technology(ST) would assist adjustment to the nursing home facilities in the elderly. Since there is not much previous research on this subject, we generated survey questionnaires on our own. Data were collected from the survey of 127 employees at 6 nursing homes including geriatric care workers, social workers and nurses who provide direct as well as indirect care services. Results showed that the utilization of ST would benefit the areas of family relationship support, health support, leisure support, and physical environment adjustment. As for physical environment adjustment, study participants reported that ST would help elders familiarize employees and find directions for specific space the most. As for health support, ST would be best utilized as a security sensor and program alarm system. As for support for family relationship, ST was expected to be utilized as looking at family pictures and playing with self pictures/videos. As for leisure support, ST was expected to assist elders to listen to music and watch movies/TV. These results were different according to the characteristics of the participants and the smartifacts. These results of the study will show the direction for more in-depth studies on application of smart technology for the elderly in the future.

ID-based Authentication Schemes with Forward Secrecy for Smart Grid AMI Environment (스마트그리드 AMI 환경을 위한 전방 보안성이 강화된 ID기반 인증 기법)

  • Park, Dae-Il;Yeo, Sang-Soo
    • Journal of Advanced Navigation Technology
    • /
    • v.17 no.6
    • /
    • pp.736-748
    • /
    • 2013
  • In this paper, we analyse the vulnerabilities of KL scheme which is an ID-based authentication scheme for AMI network, and propose two kinds of authentication schemes which satisfy forward secrecy as well as security requirements introduced in the previous works. In the first scheme, we use MDMS which is the supervising system located in an electrical company for a time-synchronizing server, in order to synchronize smart grid devices in home, and we process device authentication with a new secret value generated by OTP function every session. In the second scheme, we use a secret hash-chain mechanism for authentication process, so we can use a new secret value every session. The proposed two schemes have strong points and weak points respectively and those depend on the services area and its environment, so we can select one of them efficiently considering real aspects of AMI environment.

Design and Implementation of Convenience System Based on IoT (IoT를 기반한 편의 시스템 설계 및 구현)

  • Ui-Do Kim;Seung-Jin Yu;Jae-Won Lee;Seok-Tae Cho;Jae-Wook Kim
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.19 no.1
    • /
    • pp.165-172
    • /
    • 2024
  • In this paper, we designed a smart home system that can be used intuitively and easily in everyday life, such as sending text messages to users, providing various information and scheduling using smart AI, and providing lighting and atmosphere suitable for the atmosphere in situations such as listening to music using neopixels, as well as using ESP32, RFID, and Google Cloude Console using raspberry pie. As a result of the experiment, it was confirmed that security characters were normally sent to users when RFID was recognized on ESP32 connected to Wi-Fi even if the power was reconnected, and smart AI using Neopixel lighting, Raspberry Pie, and voice recognition, which calculated frequency, also changed the recognition rate over distance, but it worked.

Realistic Multiple Fault Injection System Based on Heterogeneous Fault Sources (이종(異種) 오류원 기반의 현실적인 다중 오류 주입 시스템)

  • Lee, JongHyeok;Han, Dong-Guk
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.30 no.6
    • /
    • pp.1247-1254
    • /
    • 2020
  • With the advent of the smart home era, equipment that provides confidentiality or performs authentication exists in various places in real life. Accordingly security against physical attacks is required for encryption equipment and authentication equipment. In particular, fault injection attack that artificially inject a fault from the outside to recover a secret key or bypass an authentication process is one of the very threatening attack methods. Fault sources used in fault injection attacks include lasers, electromagnetic, voltage glitches, and clock glitches. Fault injection attacks are classified into single fault injection attacks and multiple fault injection attacks according to the number of faults injected. Existing multiple fault injection systems generally use a single fault source. The system configured to inject a single source of fault multiple times has disadvantages that there is a physical delay time and additional equipment is required. In this paper, we propose a multiple fault injection system using heterogeneous fault sources. In addition, to show the effectiveness of the proposed system, the results of a multiple fault injection attack against Riscure's Piñata board are shown.

A Study on the Application of Modularization Technique to Standard Security Policy to Protect Information Assets and the Securement of Confidentiality and Integrity (정보자산 보호를 위한 표준 보안정책 모듈화 기법 적용과 기밀성 및 무결성 확보를 위한 연구)

  • Seo, Woo-Seok
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.14 no.1
    • /
    • pp.111-118
    • /
    • 2019
  • For the security of a vast amount of information, it has been started to diagnose the site as a way of operating and managing the information owned by a company holding assets, to establish indexes to check the actual status and all kinds of standards to obtain security, and also to classify the information assets based on that. This has been extended to many different areas including policies to operate and manage information assets, services, the management of owned devices as physical assets, and also the management of logical assets for application software and platforms. Some of these information assets are already being operated in reality as new technology in new areas, for example, Internet of Things. Of course, a variety of electronic devices like Smart Home are being used in ordinary families, and unlike in the past, these devices generate a series of information life cycles such as accumulating and processing information. Moreover, as even distribution is now being realized, we are facing a task to secure the stability of information assets and also information that assets are holding. The purpose of this study is to suggest and apply standard security policy by moduling methods for information assets owned by companies and even families and obtain the enhancement of confidentiality as well as integrity.

Improvement Method of ELIS Local Laws and Regulations Format for Personal Information Protection (개인정보보호를 위한 ELIS의 자치법규서식 개선방안)

  • Choi, Chul-Jae;Lee, Young-Sik;Lee, Tae-Hee
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.11 no.11
    • /
    • pp.1017-1024
    • /
    • 2016
  • In this paper, we have figured out status and demand about personal information in local laws and regulations of the four major city out of the municipality 18 institutions of Gangwon Province. To take advantage of the autonomous regulations Information System(ELIS), and research and analysis in the autonomy regulations of local governments to object to the attachment format. To object to the Attachment to the request of the resident registration number notation is a super key. There is a disclosure resistance sense of personal information, and research analysis of the smart phone number and home phone number. We have proposed the urgent development of automatic search engine of PIMS compliance with personal information.