• Title/Summary/Keyword: Theft

Search Result 273, Processing Time 0.057 seconds

Research on Security Threats Emerging from Blockchain-based Services

  • Yoo, Soonduck
    • International Journal of Internet, Broadcasting and Communication
    • /
    • v.13 no.4
    • /
    • pp.1-10
    • /
    • 2021
  • The purpose of the study is to contribute to the positive development of blockchain technology by providing data to examine security vulnerabilities and threats to blockchain-based services and review countermeasures. The findings of this study are as follows. Threats to the security of blockchain-based services can be classified into application security threats, smart contract security threats, and network (P2P) security threats. First, application security threats include wallet theft (e-wallet stealing), double spending (double payment attack), and cryptojacking (mining malware infection). Second, smart contract security threats are divided into reentrancy attacks, replay attacks, and balance increasing attacks. Third, network (P2P) security threats are divided into the 51% control attack, Sybil attack, balance attack, eclipse attack (spread false information attack), selfish mining (selfish mining monopoly), block withholding attack, DDoS attack (distributed service denial attack) and DNS/BGP hijacks. Through this study, it is possible to discuss the future plans of the blockchain technology-based ecosystem through understanding the functional characteristics of transparency or some privacy that can be obtained within the blockchain. It also supports effective coping with various security threats.

On the Untact ICT based New Concept Storage Device Design by Interworking SysML and CAD Data to Improve the Development Efficiency

  • Kim, Myung Sung;Park, Jae Min;Kim, Young Min
    • International Journal of Internet, Broadcasting and Communication
    • /
    • v.14 no.3
    • /
    • pp.258-269
    • /
    • 2022
  • In these days, innovative functions are required to unmanned parcel delivery lockers. As non-face-to-face transactions become the center due to the recent COVID-19 pandemic, many problem occurs in society such as theft crimes and lack of loading space. Therefore, New concept storage device is developed in korea. It has the functions that minimizes empty spaces by using the internal transport device to enable efficient space loading and refrigerate goods such as foods. In order to systematically approach the system design of the unmanned parcel delivery lockers which is the new function is applied, We applied model-based system engineering to improve the development efficiency and use a system modeling language to express the system. We conducted interworking research of CAD data including system modeling and design data. it is expected that this method will increase the effective development efficiency such as maintenance traceability and reduction of development period and cost.

A Review of Extended Fraud with COVID-19 on the Online Services

  • Elhussein, Bahaeldein;Karrar, Abdelrahman Elsharif
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.6
    • /
    • pp.163-171
    • /
    • 2022
  • Online services are widely spread, and their use increases day by day. As COVID-19 spread and people spent much time online, fraud scams have risen unexpectedly. Manipulation techniques have become more effective at swindling those lacking basic technological knowledge. Unfortunately, a user needs a quorum. The interest in preventing scammers from obtaining effective quality service has become the most significant obstacle, increasing the variety of daily Internet platforms. This paper is concerned with analyzing purchase data and extracting provided results. In addition, after examining relevant documents presenting research discussing them, the recommendation was made that future work avoids them; this would save a lot of effort, money, and time. This research highlights many problems a person may face in dealing with online institutions and possible solutions to the epidemic through theft operations on the Internet.

Social Media Data Analysis Trends and Methods

  • Rokaya, Mahmoud;Al Azwari, Sanaa
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.9
    • /
    • pp.358-368
    • /
    • 2022
  • Social media is a window for everyone, individuals, communities, and companies to spread ideas and promote trends and products. With these opportunities, challenges and problems related to security, privacy and rights arose. Also, the data accumulated from social media has become a fertile source for many analytics, inference, and experimentation with new technologies in the field of data science. In this chapter, emphasis will be given to methods of trend analysis, especially ensemble learning methods. Ensemble learning methods embrace the concept of cooperation between different learning methods rather than competition between them. Therefore, in this chapter, we will discuss the most important trends in ensemble learning and their applications in analysing social media data and anticipating the most important future trends.

A Study on Zero Knowledge Proof Blockchain Personal Information Authentication Using Smartphone (스마트폰을 이용한 영지식증명 블록체인 개인정보 인증에 관한 연구)

  • Lee Kwangkyu
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.19 no.3
    • /
    • pp.37-44
    • /
    • 2023
  • In the future society, a means to verify the identity of the information owner is required at the beginning of most services that the information owner encounters, and the emergence and gradual spread of digital identification that proves the identity of the information owner is essential. In addition, as the utilization value of personal information increases, discussions on how to provide personal information are active. Therefore, there is a need for a personal information management method necessary for building a hyper-connected society that is safe from various hacking, forgery, alteration, and theft by allowing the owner to directly manage and provide personal information management. In this study, a decentralized identity information management model that overcomes the problems and limitations of the centralized identity management method of personal information and manages and selectively provides personal information by the information owner himself and implemented a smart personal information provision system(SPIPS: Smart Personal Information Provision System) using a smartphone.

The Validation Test process and CTE Suitability Evaluation based on IEC-61508 for Improving Safety and Reliability on Unmanned ICT Parcel Storage

  • Myung Sung Kim;Young Min Kim
    • International journal of advanced smart convergence
    • /
    • v.12 no.3
    • /
    • pp.233-243
    • /
    • 2023
  • In modern society, since the expansion of the e-commerce market and the spread of the pandemic, face-to-face business are gradually changing to non-face-to-face. In the logistics industry, the demand for unmanned courier storage is increasing due to lack of loading space from urbanization and courier theft accidents. As the demand for unmanned parcel lockers increases, improved functions such as food storage and efficient space loading are required. This study develops an integrated model-based evaluation procedure of product based on performance factors according to the IEC 61508 standard for newly unmanned parcel storage devices with active loading technology, and derive Critical Technology Element based on the product's core functions and performance goals. As proposing these research, We expect improve the safety and reliability of development targets by identifying and evaluating elements.

RELIABILITY TEST OF RFID TECHNOLOGY IN TOOL TRACKING

  • Julian Kang;Jae-Heon Nam
    • International conference on construction engineering and project management
    • /
    • 2005.10a
    • /
    • pp.820-823
    • /
    • 2005
  • RFID technology offers the possibility that tools and valuable supplies tagged with RFID devices could be tacked down automatically. Such automated tool tracking has the potential to reduce theft, identify underutilized tools to be relocated, insure that crafts have access to the appropriate tools as needed, and reduce overhead labor cost of managing tools. Although other industries have been busy to enhance their supply chain management using RFID technology, construction professionals may be wondering whether it works reliably in construction jobsites as well. This paper presents a field test conducted to determine the reliability of RFID technology in identifying tools in the field storage box. The test indicated that RFID technology is reliable in inventorying tools in field storage.

  • PDF

Anti-Theft System Using Android Bluetooth Communication (안드로이드 블루투스 통신을 이용한 도난방지 시스템)

  • Yoon, Dong-Hwan;Kim, Jong-Min;Ha, Ji-Wan;Kong, Ki-Sok;Bang, Young-Cheol;Lee, Sang-Woo
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2011.11a
    • /
    • pp.11-14
    • /
    • 2011
  • 안드로이드 블루투스를 이용한 앱으로, 사용자가 도난방지 시스템을 사용하여 개인 소지품에 모듈을 부착하여 도난방지를 할 수 있는 시스템이다. 폰과 모듈간의 블루투스 수신 감도(RSSI)를 체크하여 수신 거리를 측정하게 되고, 그 거리가 10m이상 떨어지게되면 사용자에게 도난 알림을 알려준다. 또한, 사용자에게 전화가 온 것을 모듈 자체에서 수신하여 알려주는 핸즈프리 기능도 갖췄다. 모듈은 ATMEGA128(MCU), FB155BC(블루투스 모듈), 부저, 진동등의 부품을 조립하여 제작하였다.

Danger Alert Surveillance Camera Service using AI Image Recognition technology (인공지능 이미지 인식 기술을 활용한 위험 알림 CCTV 서비스)

  • Lee, Ha-Rin;Kim, Yoo-Jin;Lee, Min-Ah;Moon, Jae-Hyun
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2020.11a
    • /
    • pp.814-817
    • /
    • 2020
  • The number of single-person households is increasing every year, and there are also high concerns about the crime and safety of single-person households. In particular, crimes targeting women are increasing. Although home surveillance camera applications, which are mostly used by single-person households, only provide intrusion detection functions, this service utilizes AI image recognition technologies such as face recognition and object detection to provide theft, violence, stranger and intrusion detection. Users can receive security-related notifications, relieve their anxiety, and prevent crimes through this service.

Abnormal Behavior Monitoring System with YOLO AI Platform (YOLO 인공지능 플랫폼을 이용한 이상행동 감시 시스템)

  • Lee, Sang-Rak;Son, Byeong-Su;Park, Jun-Ho;Choi, Byeong-Yoon
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2021.05a
    • /
    • pp.431-433
    • /
    • 2021
  • In this paper, abnormal behavior monitoring system using YOLO AI platform was implemented and had superior response characteristics compared to the conventional monitoring system using two-shot detection by using one-shot detection of YOLO system. The YOLO platform was trained using image dataset composed of abnormal behaviors such as assault, theft, and arson. The abnormal behavior monitoring system consists of client and server and can be applicable to smart cities to solve various crime problems if it is commercialized.

  • PDF