• 제목/요약/키워드: Theft

검색결과 273건 처리시간 0.023초

Research on Security Threats Emerging from Blockchain-based Services

  • Yoo, Soonduck
    • International Journal of Internet, Broadcasting and Communication
    • /
    • 제13권4호
    • /
    • pp.1-10
    • /
    • 2021
  • The purpose of the study is to contribute to the positive development of blockchain technology by providing data to examine security vulnerabilities and threats to blockchain-based services and review countermeasures. The findings of this study are as follows. Threats to the security of blockchain-based services can be classified into application security threats, smart contract security threats, and network (P2P) security threats. First, application security threats include wallet theft (e-wallet stealing), double spending (double payment attack), and cryptojacking (mining malware infection). Second, smart contract security threats are divided into reentrancy attacks, replay attacks, and balance increasing attacks. Third, network (P2P) security threats are divided into the 51% control attack, Sybil attack, balance attack, eclipse attack (spread false information attack), selfish mining (selfish mining monopoly), block withholding attack, DDoS attack (distributed service denial attack) and DNS/BGP hijacks. Through this study, it is possible to discuss the future plans of the blockchain technology-based ecosystem through understanding the functional characteristics of transparency or some privacy that can be obtained within the blockchain. It also supports effective coping with various security threats.

On the Untact ICT based New Concept Storage Device Design by Interworking SysML and CAD Data to Improve the Development Efficiency

  • Kim, Myung Sung;Park, Jae Min;Kim, Young Min
    • International Journal of Internet, Broadcasting and Communication
    • /
    • 제14권3호
    • /
    • pp.258-269
    • /
    • 2022
  • In these days, innovative functions are required to unmanned parcel delivery lockers. As non-face-to-face transactions become the center due to the recent COVID-19 pandemic, many problem occurs in society such as theft crimes and lack of loading space. Therefore, New concept storage device is developed in korea. It has the functions that minimizes empty spaces by using the internal transport device to enable efficient space loading and refrigerate goods such as foods. In order to systematically approach the system design of the unmanned parcel delivery lockers which is the new function is applied, We applied model-based system engineering to improve the development efficiency and use a system modeling language to express the system. We conducted interworking research of CAD data including system modeling and design data. it is expected that this method will increase the effective development efficiency such as maintenance traceability and reduction of development period and cost.

A Review of Extended Fraud with COVID-19 on the Online Services

  • Elhussein, Bahaeldein;Karrar, Abdelrahman Elsharif
    • International Journal of Computer Science & Network Security
    • /
    • 제22권6호
    • /
    • pp.163-171
    • /
    • 2022
  • Online services are widely spread, and their use increases day by day. As COVID-19 spread and people spent much time online, fraud scams have risen unexpectedly. Manipulation techniques have become more effective at swindling those lacking basic technological knowledge. Unfortunately, a user needs a quorum. The interest in preventing scammers from obtaining effective quality service has become the most significant obstacle, increasing the variety of daily Internet platforms. This paper is concerned with analyzing purchase data and extracting provided results. In addition, after examining relevant documents presenting research discussing them, the recommendation was made that future work avoids them; this would save a lot of effort, money, and time. This research highlights many problems a person may face in dealing with online institutions and possible solutions to the epidemic through theft operations on the Internet.

Social Media Data Analysis Trends and Methods

  • Rokaya, Mahmoud;Al Azwari, Sanaa
    • International Journal of Computer Science & Network Security
    • /
    • 제22권9호
    • /
    • pp.358-368
    • /
    • 2022
  • Social media is a window for everyone, individuals, communities, and companies to spread ideas and promote trends and products. With these opportunities, challenges and problems related to security, privacy and rights arose. Also, the data accumulated from social media has become a fertile source for many analytics, inference, and experimentation with new technologies in the field of data science. In this chapter, emphasis will be given to methods of trend analysis, especially ensemble learning methods. Ensemble learning methods embrace the concept of cooperation between different learning methods rather than competition between them. Therefore, in this chapter, we will discuss the most important trends in ensemble learning and their applications in analysing social media data and anticipating the most important future trends.

스마트폰을 이용한 영지식증명 블록체인 개인정보 인증에 관한 연구 (A Study on Zero Knowledge Proof Blockchain Personal Information Authentication Using Smartphone)

  • 이광규
    • 디지털산업정보학회논문지
    • /
    • 제19권3호
    • /
    • pp.37-44
    • /
    • 2023
  • In the future society, a means to verify the identity of the information owner is required at the beginning of most services that the information owner encounters, and the emergence and gradual spread of digital identification that proves the identity of the information owner is essential. In addition, as the utilization value of personal information increases, discussions on how to provide personal information are active. Therefore, there is a need for a personal information management method necessary for building a hyper-connected society that is safe from various hacking, forgery, alteration, and theft by allowing the owner to directly manage and provide personal information management. In this study, a decentralized identity information management model that overcomes the problems and limitations of the centralized identity management method of personal information and manages and selectively provides personal information by the information owner himself and implemented a smart personal information provision system(SPIPS: Smart Personal Information Provision System) using a smartphone.

The Validation Test process and CTE Suitability Evaluation based on IEC-61508 for Improving Safety and Reliability on Unmanned ICT Parcel Storage

  • Myung Sung Kim;Young Min Kim
    • International journal of advanced smart convergence
    • /
    • 제12권3호
    • /
    • pp.233-243
    • /
    • 2023
  • In modern society, since the expansion of the e-commerce market and the spread of the pandemic, face-to-face business are gradually changing to non-face-to-face. In the logistics industry, the demand for unmanned courier storage is increasing due to lack of loading space from urbanization and courier theft accidents. As the demand for unmanned parcel lockers increases, improved functions such as food storage and efficient space loading are required. This study develops an integrated model-based evaluation procedure of product based on performance factors according to the IEC 61508 standard for newly unmanned parcel storage devices with active loading technology, and derive Critical Technology Element based on the product's core functions and performance goals. As proposing these research, We expect improve the safety and reliability of development targets by identifying and evaluating elements.

RELIABILITY TEST OF RFID TECHNOLOGY IN TOOL TRACKING

  • Julian Kang;Jae-Heon Nam
    • 국제학술발표논문집
    • /
    • The 1th International Conference on Construction Engineering and Project Management
    • /
    • pp.820-823
    • /
    • 2005
  • RFID technology offers the possibility that tools and valuable supplies tagged with RFID devices could be tacked down automatically. Such automated tool tracking has the potential to reduce theft, identify underutilized tools to be relocated, insure that crafts have access to the appropriate tools as needed, and reduce overhead labor cost of managing tools. Although other industries have been busy to enhance their supply chain management using RFID technology, construction professionals may be wondering whether it works reliably in construction jobsites as well. This paper presents a field test conducted to determine the reliability of RFID technology in identifying tools in the field storage box. The test indicated that RFID technology is reliable in inventorying tools in field storage.

  • PDF

안드로이드 블루투스 통신을 이용한 도난방지 시스템 (Anti-Theft System Using Android Bluetooth Communication)

  • 윤동환;김종민;하지완;공기석;방영철;이상우
    • 한국정보처리학회:학술대회논문집
    • /
    • 한국정보처리학회 2011년도 추계학술발표대회
    • /
    • pp.11-14
    • /
    • 2011
  • 안드로이드 블루투스를 이용한 앱으로, 사용자가 도난방지 시스템을 사용하여 개인 소지품에 모듈을 부착하여 도난방지를 할 수 있는 시스템이다. 폰과 모듈간의 블루투스 수신 감도(RSSI)를 체크하여 수신 거리를 측정하게 되고, 그 거리가 10m이상 떨어지게되면 사용자에게 도난 알림을 알려준다. 또한, 사용자에게 전화가 온 것을 모듈 자체에서 수신하여 알려주는 핸즈프리 기능도 갖췄다. 모듈은 ATMEGA128(MCU), FB155BC(블루투스 모듈), 부저, 진동등의 부품을 조립하여 제작하였다.

인공지능 이미지 인식 기술을 활용한 위험 알림 CCTV 서비스 (Danger Alert Surveillance Camera Service using AI Image Recognition technology)

  • 이하린;김유진;이민아;문재현
    • 한국정보처리학회:학술대회논문집
    • /
    • 한국정보처리학회 2020년도 추계학술발표대회
    • /
    • pp.814-817
    • /
    • 2020
  • The number of single-person households is increasing every year, and there are also high concerns about the crime and safety of single-person households. In particular, crimes targeting women are increasing. Although home surveillance camera applications, which are mostly used by single-person households, only provide intrusion detection functions, this service utilizes AI image recognition technologies such as face recognition and object detection to provide theft, violence, stranger and intrusion detection. Users can receive security-related notifications, relieve their anxiety, and prevent crimes through this service.

YOLO 인공지능 플랫폼을 이용한 이상행동 감시 시스템 (Abnormal Behavior Monitoring System with YOLO AI Platform)

  • 이상락;손병수;박준호;최병윤
    • 한국정보통신학회:학술대회논문집
    • /
    • 한국정보통신학회 2021년도 춘계학술대회
    • /
    • pp.431-433
    • /
    • 2021
  • 본 논문에서는 YOLO 인공 지능 플랫폼을 이용하는 이상행동 감시 시스템을 구현하였으며, YOLO 시스템의 one-shot 감지 시스템 사용으로 기존 감시 시스템에 비해 우수한 응답 특성을 갖는다. YOLO 인공 플랫폼은 폭행, 절도, 방화와 같은 이상행동들로 구성된 이미지 세트로 학습되었다. 이상행동 감시 시스템은 서버와 클라이언트로 구성되어 있으며, 상용화될 경우 각종 범죄 문제를 풀기 위해 스마트시티에 적용이 가능하다.

  • PDF