• 제목/요약/키워드: Special security

검색결과 542건 처리시간 0.028초

헬스캐어 시스템에서의 사물 인터넷 통신을 위한 보안 문제 분석 (Analyses of Security Issues for Internet of Things in Healthcare Application)

  • 신윤구;김한규;김수진;김정태
    • 한국정보통신학회:학술대회논문집
    • /
    • 한국정보통신학회 2014년도 추계학술대회
    • /
    • pp.699-700
    • /
    • 2014
  • The use of Radio Frequency Identification technology (RFID) in medical context enables not only drug identification, but also a rapid and precise identification of patients, physicians, nurses or any other healthcare giver. The combination of RFID tag identification with structured and secured Internet of Things (IoT) solutions enables ubiquitous and easy access to medical related records, while providing control and security to all interactions. This paper defines a basic security architecture, easily deployable on mobile platforms, which would allow to establish and manage a medication prescription service in mobility context making use of electronic Personal Health Records. This security architecture is aimed to be used with a mobile e-health application (m-health) through a simple and intuitive interface, supported by RFID technology. This architecture, able to support secured and authenticated interactions, will enable an easy deployment of m-health applications. The special case of drug administration and ubiquitous medication control system, along with the corresponding Internet of Things context, is presented.

  • PDF

CCTV-Based Multi-Factor Authentication System

  • Kwon, Byoung-Wook;Sharma, Pradip Kumar;Park, Jong-Hyuk
    • Journal of Information Processing Systems
    • /
    • 제15권4호
    • /
    • pp.904-919
    • /
    • 2019
  • Many security systems rely solely on solutions based on Artificial Intelligence, which are weak in nature. These security solutions can be easily manipulated by malicious users who can gain unlawful access. Some security systems suggest using fingerprint-based solutions, but they can be easily deceived by copying fingerprints with clay. Image-based security is undoubtedly easy to manipulate, but it is also a solution that does not require any special training on the part of the user. In this paper, we propose a multi-factor security framework that operates in a three-step process to authenticate the user. The motivation of the research lies in utilizing commonly available and inexpensive devices such as onsite CCTV cameras and smartphone camera and providing fully secure user authentication. We have used technologies such as Argon2 for hashing image features and physically unclonable identification for secure device-server communication. We also discuss the methodological workflow of the proposed multi-factor authentication framework. In addition, we present the service scenario of the proposed model. Finally, we analyze qualitatively the proposed model and compare it with state-of-the-art methods to evaluate the usability of the model in real-world applications.

보안이 강화된 특수목적용 웹서버 설계 및 구축 제안 (Proposal for Designing and Building a Special Purpose Web Server with Enhanced Security)

  • 홍성락;조인준
    • 한국콘텐츠학회논문지
    • /
    • 제22권2호
    • /
    • pp.71-79
    • /
    • 2022
  • 현재 웹 서버의 보안을 위해 관제와 모의 해킹을 한다고 해도 계속해서 취약점이 발생하고 해킹을 당하는 것이 현실이다. 해당 문제를 해결하기 위해 L4와 L5 사이에서 소켓을 사용해 모든 웹 통신을 제어할 수 있는 보안 웹 서버를 개발했다. 그리고 HTTP 응답을 줄 때 매번 파일과 헤더를 합치는 행위를 미리 합쳐놓는 방식을 제안했다. 그 결과 보안과 속도를 둘 다 향상할 수 있었다. 따라서 본 논문에서는 관제와 모의 해킹을 해도 취약점이 발생하는 이유와 그것에 대한 해결방안과 더 나아가 DB까지 보안을 유지할 수 있는 보안 웹 서버개발 방식을 제안하였다.

Understanding User's Continuous Use of Financial Technology Products

  • Wanchao Liu;Huosong Xia;Jian Mou
    • Asia pacific journal of information systems
    • /
    • 제31권2호
    • /
    • pp.236-256
    • /
    • 2021
  • Online financial technology products are an important consumer finance innovation. While a large body of previous research has focused on initial adoption and consumer willingness to use these products, little research explores the continued use of these products beyond the initial adoption phase. In particular, special attention should be paid to how users' trust and perceptions of privacy and security affect continued use behavior. This paper integrates the expectation confirmation model of information system continuance (ECM-ISC), the information system success model (ISSM) and the security and trust literatures to investigate continued use of online financial technology. To test the research model, we collected 398 valid questionnaires from Ant Credit Pay users. The research results show that system and service quality positively impact users' expectation confirmation, while information quality has no significant impact. Expectation confirmation and perceived usefulness positively affect user satisfaction. Moreover, the user's perception of privacy and security plays a vital role in user satisfaction. Satisfaction and perceived trust jointly promote users' continuance behaviors. Findings of this study indicates the importance of the information system success factors and security factors due to their influence on the continued use of Fintech products. This conclusion has implications for enterprises in improving the product qualities and enhancing the degree of security to meet user needs.

Facial Feature Extraction Based on Private Energy Map in DCT Domain

  • Kim, Ki-Hyun;Chung, Yun-Su;Yoo, Jang-Hee;Ro, Yong-Man
    • ETRI Journal
    • /
    • 제29권2호
    • /
    • pp.243-245
    • /
    • 2007
  • This letter presents a new feature extraction method based on the private energy map (PEM) technique to utilize the energy characteristics of a facial image. Compared with a non-facial image, a facial image shows large energy congestion in special regions of discrete cosine transform (DCT) coefficients. The PEM is generated by energy probability of the DCT coefficients of facial images. In experiments, higher face recognition performance figures of 100% for the ORL database and 98.8% for the ETRI database have been achieved.

  • PDF

개인정보관리자의 책임과 벌칙의 형평성 (The Legal Justice of Conferring Criminal Negligence on Chief Privacy Officers(CPO))

  • 김범수
    • 한국IT서비스학회지
    • /
    • 제10권4호
    • /
    • pp.21-32
    • /
    • 2011
  • The recently revised "Telecommunications Business Promotion and Personal Data Protection Act" is an important legal milestone in promoting the Korean telecommunications infrastructure and industry as well as protecting individuals' personal data and individuals' rights to privacy. Special characteristics of information security and privacy protection services including public goods' feature, adaptiveness, relativity, multi-dimensionality, and incompleteness, are reviewed. The responsibility of chief security/privacy officers in the IT industry, and the fairness and effectiveness of the criminal negligence in the Telecommunications Act are analyzed. An assessment of the rationale behind the act as well as a survey of related laws and cases in different countries, offers the following recommendations : i) revise the act and develop new systems for data protection, ii) grant a stay of execution or reduce the sentence given extenuating circumstances, or iii) use technical and managerial measures in data protection for exemption from criminal negligence.

근접 통신망의 보안성 향상을 위한 자기키 생성 알고리즘에 관한 연구 (A Study on the Self-Key Generation Algorithm for Security Elevation in Near Field Communications)

  • 정우열;이선근
    • 한국전자통신학회논문지
    • /
    • 제7권5호
    • /
    • pp.1027-1032
    • /
    • 2012
  • NFC, 블루투스, WiFi 등과 같은 근접 통신망의 발달과 더불어 보안의 중대성이 강조되고 있지만 아직까지는 괄목할 만한 연구가 진행되고 있지 않다. 본 연구에서 근접 통신망의 보안성 향상을 위하여 SSEN 알고리즘을 제안하였다. 제안된 SSEN 알고리즘은 별도의 암호기능이 필요없이 자기키를 생성하는 알고리즘으로서 인증기능을 부가적으로 수행하여 자체적으로 서비스의 처리속도 및 오류에 대하여 보다 나은 성능을 가질 수 있도록 하였다.

A Study on VoIP Information Security for Vocie Security based on SIP

  • Sung, Kyung
    • Journal of information and communication convergence engineering
    • /
    • 제6권1호
    • /
    • pp.68-72
    • /
    • 2008
  • The VoIP(Voice over IP) has been worldwide used and already put to practical use in many fields. However, it is needed to ensure secret of VoIP call in a special situation. It is relatively difficult to eaves-drop the commonly used PSTN in that it is connected with 1:1 circuit. However, it is difficult to ensure the secret of call on Internet because many users can connect to the Internet at the same time. Therefore, this paper suggests a new model of Internet telephone for eavesdrop prevention enabling VoIP(using SIP protocol) to use the VPN protocol and establish the probability of practical use comparing it with Internet telephone.

안전한 광대역 해상정보통신망 구축을 위한 WiMAX MMR 확장 프로토콜 (An Augmented WiMAX MMR Protocol for Establishing Secure Broadband Maritime Data Networks)

  • 이수환;손주영
    • Journal of Advanced Marine Engineering and Technology
    • /
    • 제34권8호
    • /
    • pp.1145-1152
    • /
    • 2010
  • 현재 해상통신망에는 고속의 데이터 송수신을 위한 경제적인 통신기술이 요구되고 있다. 해상에서는 무선통신에 전적으로 의존할 수밖에 없는 환경으로 인해 취약한 데이터 통신보안에 대한 해결책도 함께 제시되어야 한다. 이 논문에서는 광대역 해상통신망의 위와 같은 현안들을 해결하기 위하여 다중 홉 자율통신망 형성기술 가운데 하나인 WiMAX MMR 기술을 도입하고, 육상과 달리 기지국이 없는 해상 상황에서 안전한 자율망을 형성하기 위해 확장된 프로토콜을 제안한다.

Closest Vector Problem에 기반한 Interactive Proof (Closest Vector Problem Based Interactive Proof)

  • 이경희;양대헌
    • 정보보호학회논문지
    • /
    • 제22권6호
    • /
    • pp.1265-1270
    • /
    • 2012
  • 이 논문에서는 래티스(Lattice)의 CVP (Closest Vector Problem)에 기반한 영지식 증명 기반의 인증프로토콜을 제안한다. CVP를 이용해서 암호시스템을 설계할 때 흔히 사용하는 길이가 짧은 기저벡터를 트랩도어 또는 비밀키로 사용하지 않는 프로토콜로서 의의를 가지며, 프로토콜의 설계가 단순하고 안전성 증명도 쉬워진다. 제안한 프로토콜의 안전성을 completeness, soundness, simulatability로 증명한다.