• Title/Summary/Keyword: Use IoT

Search Result 649, Processing Time 0.025 seconds

Study on the Connection with Public Authentication and Bio Authentication (공인인증서와 바이오인증 연계를 위한 연구)

  • Ryu, Gab-Sang
    • Journal of Internet of Things and Convergence
    • /
    • v.1 no.1
    • /
    • pp.39-44
    • /
    • 2015
  • Organization is increasing the authorizing process to use public certificate and bio information. Certificate, has evolved to be able to parallel distributes the bio authentication and portable bio-authentication device. Authentication using an individual's PC and smart devices continue to generalize, while convenience for authentication is increased by comparison Study on cooperation with the security at the network level's a weak situation. If ask authentication method through the cooperation of the public certificate and bio information work with current network access control, there is a possibility to develop a more powerful security policy. by cooperation weaknesses against vulnerable personal authentication techniques on security token in a reliable and secure personal authentication techniques, such as bio-recognition, Bio Information for identification and to prevent exposing a methodology suggest to validate whether or not to carry out in this paper. In addition, organize the scenario that can work with the 802.1x network authentication method, and presented a proposal aimed at realization.

An Approach to Constructing an Efficient Entropy Source on Multicore Processor (멀티코어 환경에서 효율적인 엔트로피 원의 설계 기법)

  • Kim, SeongGyeom;Lee, SeungJoon;Kang, HyungChul;Hong, Deukjo;Sung, Jaechul;Hong, Seokhie
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.28 no.1
    • /
    • pp.61-71
    • /
    • 2018
  • In the Internet of Things, in which plenty of devices have connection to each other, cryptographically secure Random Number Generators (RNGs) are essential. Particularly, entropy source, which is the only one non-deterministic part in generating random numbers, has to equip with an unpredictable noise source(or more) for the required security strength. This might cause an requirement of additional hardware extracting noise source. Although additional hardware resources has better performance, it is needed to make the best use of existing resources in order to avoid extra costs, such as area, power consumption. In this paper, we suggest an entropy source which uses a multi-threaded program without any additional hardware. As a result, it reduces the difficulty when implementing on lightweight, low-power devices. Additionally, according to NIST's entropy estimation test suite, the suggested entropy source is tested to be secure enough for source of entropy input.

NFC-based Attendance Checking System for Institutions of Higher Education (NFC 기반의 고등교육기관 출결지원 시스템에 대한 실증적 연구)

  • Cho, Yun Seok;Kim, KyungMi
    • KIISE Transactions on Computing Practices
    • /
    • v.21 no.4
    • /
    • pp.283-289
    • /
    • 2015
  • We propose a low cost attendance checking system using NFC (Near Field Communication) and show a case study of an actual operation of the system in a higher education institute. The system offers a direct attendance check service when a student touches NFC tag on a classroom desk with his/her own smartphone. Our service was first developed and operated in 2012, and then additional functions like massive real time processing were reinforced. In the fall semester, 58 courses use the service and 96% of the class attendance was checked with mobile devices. The only hardware requirement of the system was NFC tag on the classroom desk, which reduced hardware cost dramatically. However, it also minimized attendance checking time into 1 minute regardless of enrolled student number.

IoT-based Taking Medicine Automation System

  • Kim, Sun-Ok;Kwon, Eun-Jin
    • Journal of the Korea Society of Computer and Information
    • /
    • v.26 no.4
    • /
    • pp.161-168
    • /
    • 2021
  • In this paper, it is a system that informs people who take medication periodically to facilitate the convenience of the elderly and the disabled. It is a system that measures the full weight of pills that need to be taken for a week using a weight sensor, and then determines whether or not the pills are taken by measuring the weight of the reduced pills again when the user takes them. For people with disabilities who are unable to move, it includes the function of automatically transporting medicine to the user-set location at the time of use using a line tracer based autonomous vehicle. It is also configured to inform users who have not taken the pill through an alarm that includes visual and auditory functions at a specific time to inform them of this. This work attempts to help users take their medication without forgetting by segmenting the task performance process of such a system through simulations.

An Analysis of Cyber Attacks and Response Cases Related to COVID-19 (코로나19 관련 사이버 공격 및 대응현황 분석)

  • Lee, Yongpil;Lee, Dong-Geun
    • Journal of Information Technology Services
    • /
    • v.20 no.5
    • /
    • pp.119-136
    • /
    • 2021
  • Since the global spread of COVID-19, social distancing and untact service implementation have spread rapidly. With the transition to a non-face-to-face environment such as telework and remote classes, cyber security threats have increased, and a lot of cyber compromises have also occurred. In this study, cyber-attacks and response cases related to COVID-19 are summarized in four aspects: cyber fraud, cyber-attacks on companies related to COVID-19 and healthcare sector, cyber-attacks on untact services such as telework, and preparation of untact services security for post-covid 19. After the outbreak of the COVID-19 pandemic, related events such as vaccination information and payment of national disaster aid continued to be used as bait for smishing and phishing. In the aspect of cyber-attacks on companies related to COVID-19 and healthcare sector, we can see that the damage was rapidly increasing as state-supported hackers attack those companies to obtain research results related to the COVID-19, and hackers chose medical institutions as targets with an efficient ransomware attack approach by changing 'spray and pray' strategy to 'big-game hunting'. Companies using untact services such as telework are experiencing cyber breaches due to insufficient security settings, non-installation of security patches, and vulnerabilities in systems constituting untact services such as VPN. In response to these cyber incidents, as a case of cyber fraud countermeasures, security notices to preventing cyber fraud damage to the public was announced, and security guidelines and ransomware countermeasures were provided to organizations related to COVID-19 and medical institutions. In addition, for companies that use and provide untact services, security vulnerability finding and system development environment security inspection service were provided by Government funding programs. We also looked at the differences in the role of the government and the target of security notices between domestic and overseas response cases. Lastly, considering the development of untact services by industry in preparation for post-COVID-19, supply chain security, cloud security, development security, and IoT security were suggested as common security reinforcement measures.

Proposal of Network Security Solution based on Software Definition Perimeter for Secure Cloud Environment (안전한 클라우드 환경을 위한 소프트웨어 정의 경계 기반의 네트워크 보안 솔루션 제안)

  • Cha, Wuk-Jae;Shin, Jae-In;Lee, Dong-Bum;Kim, Hyeob;Lee, Dae-Hyo
    • Journal of the Korea Convergence Society
    • /
    • v.9 no.12
    • /
    • pp.61-68
    • /
    • 2018
  • As the smartphone and mobile environment develop, the time and space constraints for individual work performance are disappearing. Companies can reduce costs and expand their business quickly through cloud computing. As the use of various cloud expands, the boundaries of users, data, and applications are disappearing. Traditional security approaches based on boundaries (Perimeter) are losing their utility in the cloud environment. This paper describes the limitations of existing network access control (NAC) in a cloud environment and suggests network security technology that complements it. The study explains the SDP and combines SDP(Software Defined Perimeter) to overcome the limitations of NAC, while at the same time explaining its role as a new framework for supporting the cloud environment. The new framework proposed in this paper suggests a software-based network security solution that supports physical and software parts, providing identity-based access control, encrypted segment management, and dynamic policy management, not IP-based.

Topic Modeling on Research Trends of Industry 4.0 Using Text Mining (텍스트 마이닝을 이용한 4차 산업 연구 동향 토픽 모델링)

  • Cho, Kyoung Won;Woo, Young Woon
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.23 no.7
    • /
    • pp.764-770
    • /
    • 2019
  • In this research, text mining techniques were used to analyze the papers related to the "4th Industry". In order to analyze the papers, total of 685 papers were collected by searching with the keyword "4th industry" in Korea Journal Index(KCI) from 2016 to 2019. We used Python-based web scraping program to collect papers and use topic modeling techniques based on LDA algorithm implemented in R language for data analysis. As a result of perplexity analysis on the collected papers, nine topics were determined optimally and nine representative topics of the collected papers were extracted using the Gibbs sampling method. As a result, it was confirmed that artificial intelligence, big data, Internet of things(IoT), digital, network and so on have emerged as the major technologies, and it was confirmed that research has been conducted on the changes due to the major technologies in various fields related to the 4th industry such as industry, government, education field, and job.

A Study on the Safety Monitoring of Bridge Facilities based on Smart Sensors (스마트 센서 기반의 교량 시설물 안전 모니터링 기법 연구)

  • YEON, Sang-Ho;KIM, Joon-Soo;YEON, Chun-Hum
    • Journal of the Korean Association of Geographic Information Studies
    • /
    • v.22 no.2
    • /
    • pp.97-106
    • /
    • 2019
  • Today, many smart sensor's measurement instruments are used to check the safety situation of various medium and large bridge structures that should be maintained in the construction facilities, but most of them use the method of measuring and confirming the displacement behavior of the bridge at regular intervals. In order to continuously check the safety situation, various measuring instruments are used, but most of them are not able to measure and measure the displacement and behavior of main construction structures at regular intervals. In this study, GNSS and environment smart sensors and drone's image data are transmitted to wireless network so that risk of many bridge's structures can be detected beforehand. As a result, by diagnosing the fine displacement of the bridge in real time and its condition, reinforcement, repair and disaster prevention measures for the structural parts of the bridges, which are expected to be dangerous, and various disasters and accidents can be prevented, and disaster can be prevented could suggest a new alternative.

Design and Implementation of Smart Home Remote Control Based on Internet of Things Service Platform (사물인터넷 서비스 플랫폼 기반 스마트 홈 리모컨의 설계 및 구현)

  • Oh, Am-Suk
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.22 no.12
    • /
    • pp.1563-1570
    • /
    • 2018
  • Internet of Things technology is rapidly becoming a reality in many parts of our lives through various product services, and product development especially in the field of smart home is being actively carried out. Most controllers for controlling various smart home products use smart phone applications. However, smart phone applications are not suitable as smart home controllers, contrary to smart home services that emphasize intelligence and convenience. In order to provide intelligent smart home service, intuitive form of smart home controller is needed, which enables integrated control of smart home device. Therefore, this paper proposes a smart home remote control that can control the Internet devices and services of objects. The proposed smart home remote control provides an environment where users can build a smart home service through the IFTTT(If This Then That) automated service platform.

Factory environmental management system based on MQTT using LoRa (LoRa망을 이용한 MQTT기반의 공장 환경 관리 시스템)

  • Ko, Jae-wook;Kim, Hye-Jeong;Lee, Bo-Kyung
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.18 no.6
    • /
    • pp.83-90
    • /
    • 2018
  • LoRa (Long Range) is a long-distance, low-power communication technology. Broader range of communication than NFC technology allows communication without having to install multiple APs and reduces the cost of initial infrastructure deployment. MQTT (Message, Queuing, Telemetry, Transport) protocol is also low power and lightweight protocols. It can increase module persistence and reduce maintenance costs when used with LoRa. In this paper, we developed a system for compiling various environmental information in a factory using LoRa and MQTT. Environmental sensor data from long distances can be monitored by the management system and the facilities in each workshop can be controlled. Performance tests have also shown that the use of LoRa and MQTT is effective in terms of long-distance and power consumption.